akeyless 3.3.6 → 3.3.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/docs/ListItems.md +2 -0
- data/docs/Target.md +2 -0
- data/docs/UpdatePKICertIssuer.md +8 -6
- data/docs/UpdateSSHCertIssuer.md +3 -1
- data/docs/V2Api.md +1 -1
- data/docs/VerifyDataWithClassicKey.md +2 -2
- data/lib/akeyless/models/list_items.rb +13 -1
- data/lib/akeyless/models/target.rb +10 -1
- data/lib/akeyless/models/update_pki_cert_issuer.rb +17 -7
- data/lib/akeyless/models/update_ssh_cert_issuer.rb +12 -2
- data/lib/akeyless/models/verify_data_with_classic_key.rb +10 -10
- data/lib/akeyless/version.rb +1 -1
- metadata +617 -617
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: a58478490360a3f9f0a7b9d706e40bfa139a39b0d09ed98da0b08f4764c553f4
|
|
4
|
+
data.tar.gz: bc3568f0358816e2eb54b127cba525c74ab744612db310fd3c75c5e3d5addbdd
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 37b4fe0e495ab7092c994f16b232f28bb49dc73f1d57a3b9a0d5775375d89033e5df4cc07b811cf5ff76acb2c4179d64909a7405844156e80f052e99f11cb949
|
|
7
|
+
data.tar.gz: 426d38b9eeec69d495294c1fef8439eed5b9b42ac077be15a8123992fe99353f7f57bfed0f3cb00cde326ccedfb88c73e3b00e0ca11561ccc7264c1a721f265d
|
data/README.md
CHANGED
|
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
|
8
8
|
|
|
9
9
|
- API version: 2.0
|
|
10
|
-
- Package version: 3.3.
|
|
10
|
+
- Package version: 3.3.7
|
|
11
11
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
|
12
12
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
|
13
13
|
|
data/docs/ListItems.md
CHANGED
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **filter** | **String** | Filter by item name or part of it | [optional] |
|
|
9
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
10
10
|
| **minimal_view** | **Boolean** | | [optional] |
|
|
11
|
+
| **pagination** | **String** | Retrieve items with pagination | [optional][default to 'enabled'] |
|
|
11
12
|
| **pagination_token** | **String** | Next page reference | [optional] |
|
|
12
13
|
| **path** | **String** | Path to folder | [optional] |
|
|
13
14
|
| **sra_only** | **Boolean** | Filter by items with SRA functionality enabled | [optional][default to false] |
|
|
@@ -27,6 +28,7 @@ instance = Akeyless::ListItems.new(
|
|
|
27
28
|
filter: null,
|
|
28
29
|
json: null,
|
|
29
30
|
minimal_view: null,
|
|
31
|
+
pagination: null,
|
|
30
32
|
pagination_token: null,
|
|
31
33
|
path: null,
|
|
32
34
|
sra_only: null,
|
data/docs/Target.md
CHANGED
|
@@ -19,6 +19,7 @@
|
|
|
19
19
|
| **target_id** | **Integer** | | [optional] |
|
|
20
20
|
| **target_items_assoc** | [**Array<TargetItemAssociation>**](TargetItemAssociation.md) | | [optional] |
|
|
21
21
|
| **target_name** | **String** | | [optional] |
|
|
22
|
+
| **target_sub_type** | **String** | | [optional] |
|
|
22
23
|
| **target_type** | **String** | | [optional] |
|
|
23
24
|
| **target_versions** | [**Array<ItemVersion>**](ItemVersion.md) | | [optional] |
|
|
24
25
|
| **with_customer_fragment** | **Boolean** | | [optional] |
|
|
@@ -44,6 +45,7 @@ instance = Akeyless::Target.new(
|
|
|
44
45
|
target_id: null,
|
|
45
46
|
target_items_assoc: null,
|
|
46
47
|
target_name: null,
|
|
48
|
+
target_sub_type: null,
|
|
47
49
|
target_type: null,
|
|
48
50
|
target_versions: null,
|
|
49
51
|
with_customer_fragment: null
|
data/docs/UpdatePKICertIssuer.md
CHANGED
|
@@ -11,14 +11,15 @@
|
|
|
11
11
|
| **allowed_uri_sans** | **String** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] |
|
|
12
12
|
| **client_flag** | **Boolean** | If set, certificates will be flagged for client auth use | [optional] |
|
|
13
13
|
| **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
|
|
14
|
-
| **country** | **String** | A comma-separated list of
|
|
14
|
+
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
|
15
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
|
15
16
|
| **description** | **String** | Description of the object | [optional] |
|
|
16
17
|
| **destination_path** | **String** | A path in which to save generated certificates | [optional] |
|
|
17
18
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
18
19
|
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode | [optional] |
|
|
19
20
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
20
21
|
| **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
|
|
21
|
-
| **locality** | **String** | A comma-separated list of
|
|
22
|
+
| **locality** | **String** | A comma-separated list of localities that will be set in the issued certificate | [optional] |
|
|
22
23
|
| **metadata** | **String** | Deprecated - use description | [optional] |
|
|
23
24
|
| **name** | **String** | PKI certificate issuer name | |
|
|
24
25
|
| **new_name** | **String** | New item name | [optional] |
|
|
@@ -26,15 +27,15 @@
|
|
|
26
27
|
| **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
|
|
27
28
|
| **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
|
|
28
29
|
| **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
|
|
29
|
-
| **postal_code** | **String** | A comma-separated list of
|
|
30
|
+
| **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
|
|
30
31
|
| **protect_certificates** | **Boolean** | Whether to protect generated certificates from deletion | [optional] |
|
|
31
|
-
| **province** | **String** | A comma-separated list of
|
|
32
|
+
| **province** | **String** | A comma-separated list of provinces that will be set in the issued certificate | [optional] |
|
|
32
33
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
33
34
|
| **server_flag** | **Boolean** | If set, certificates will be flagged for server auth use | [optional] |
|
|
34
35
|
| **signer_key_name** | **String** | A key to sign the certificate with, required in Private CA mode | [default to 'dummy_signer_key'] |
|
|
35
|
-
| **street_address** | **String** | A comma-separated list of
|
|
36
|
+
| **street_address** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] |
|
|
36
37
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
37
|
-
| **ttl** | **Integer** |
|
|
38
|
+
| **ttl** | **Integer** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | |
|
|
38
39
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
39
40
|
|
|
40
41
|
## Example
|
|
@@ -51,6 +52,7 @@ instance = Akeyless::UpdatePKICertIssuer.new(
|
|
|
51
52
|
client_flag: null,
|
|
52
53
|
code_signing_flag: null,
|
|
53
54
|
country: null,
|
|
55
|
+
delete_protection: null,
|
|
54
56
|
description: null,
|
|
55
57
|
destination_path: null,
|
|
56
58
|
expiration_event_in: null,
|
data/docs/UpdateSSHCertIssuer.md
CHANGED
|
@@ -6,6 +6,7 @@
|
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
|
|
8
8
|
| **allowed_users** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | |
|
|
9
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
|
9
10
|
| **description** | **String** | Description of the object | [optional] |
|
|
10
11
|
| **extensions** | **Hash<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] |
|
|
11
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -22,7 +23,7 @@
|
|
|
22
23
|
| **secure_access_use_internal_bastion** | **Boolean** | Use internal SSH Bastion | [optional] |
|
|
23
24
|
| **signer_key_name** | **String** | A key to sign the certificate with | |
|
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
25
|
-
| **ttl** | **Integer** |
|
|
26
|
+
| **ttl** | **Integer** | The requested Time To Live for the certificate, in seconds | |
|
|
26
27
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
27
28
|
|
|
28
29
|
## Example
|
|
@@ -33,6 +34,7 @@ require 'akeyless'
|
|
|
33
34
|
instance = Akeyless::UpdateSSHCertIssuer.new(
|
|
34
35
|
add_tag: null,
|
|
35
36
|
allowed_users: null,
|
|
37
|
+
delete_protection: null,
|
|
36
38
|
description: null,
|
|
37
39
|
extensions: null,
|
|
38
40
|
json: null,
|
data/docs/V2Api.md
CHANGED
|
@@ -17430,7 +17430,7 @@ require 'time'
|
|
|
17430
17430
|
require 'akeyless'
|
|
17431
17431
|
|
|
17432
17432
|
api_instance = Akeyless::V2Api.new
|
|
17433
|
-
body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example',
|
|
17433
|
+
body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example', name: 'name_example', signature: 'signature_example', version: 37}) # VerifyDataWithClassicKey |
|
|
17434
17434
|
|
|
17435
17435
|
begin
|
|
17436
17436
|
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
| **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
|
|
10
10
|
| **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
|
|
11
11
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
12
|
-
| **
|
|
12
|
+
| **name** | **String** | The name of the key to use in the verification process | |
|
|
13
13
|
| **signature** | **String** | The data's signature in a Base64 format. | |
|
|
14
14
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
15
15
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
@@ -26,7 +26,7 @@ instance = Akeyless::VerifyDataWithClassicKey.new(
|
|
|
26
26
|
hashed: null,
|
|
27
27
|
hashing_method: null,
|
|
28
28
|
json: null,
|
|
29
|
-
|
|
29
|
+
name: null,
|
|
30
30
|
signature: null,
|
|
31
31
|
token: null,
|
|
32
32
|
uid_token: null,
|
|
@@ -26,6 +26,9 @@ module Akeyless
|
|
|
26
26
|
|
|
27
27
|
attr_accessor :minimal_view
|
|
28
28
|
|
|
29
|
+
# Retrieve items with pagination
|
|
30
|
+
attr_accessor :pagination
|
|
31
|
+
|
|
29
32
|
# Next page reference
|
|
30
33
|
attr_accessor :pagination_token
|
|
31
34
|
|
|
@@ -56,6 +59,7 @@ module Akeyless
|
|
|
56
59
|
:'filter' => :'filter',
|
|
57
60
|
:'json' => :'json',
|
|
58
61
|
:'minimal_view' => :'minimal-view',
|
|
62
|
+
:'pagination' => :'pagination',
|
|
59
63
|
:'pagination_token' => :'pagination-token',
|
|
60
64
|
:'path' => :'path',
|
|
61
65
|
:'sra_only' => :'sra-only',
|
|
@@ -79,6 +83,7 @@ module Akeyless
|
|
|
79
83
|
:'filter' => :'String',
|
|
80
84
|
:'json' => :'Boolean',
|
|
81
85
|
:'minimal_view' => :'Boolean',
|
|
86
|
+
:'pagination' => :'String',
|
|
82
87
|
:'pagination_token' => :'String',
|
|
83
88
|
:'path' => :'String',
|
|
84
89
|
:'sra_only' => :'Boolean',
|
|
@@ -131,6 +136,12 @@ module Akeyless
|
|
|
131
136
|
self.minimal_view = attributes[:'minimal_view']
|
|
132
137
|
end
|
|
133
138
|
|
|
139
|
+
if attributes.key?(:'pagination')
|
|
140
|
+
self.pagination = attributes[:'pagination']
|
|
141
|
+
else
|
|
142
|
+
self.pagination = 'enabled'
|
|
143
|
+
end
|
|
144
|
+
|
|
134
145
|
if attributes.key?(:'pagination_token')
|
|
135
146
|
self.pagination_token = attributes[:'pagination_token']
|
|
136
147
|
end
|
|
@@ -192,6 +203,7 @@ module Akeyless
|
|
|
192
203
|
filter == o.filter &&
|
|
193
204
|
json == o.json &&
|
|
194
205
|
minimal_view == o.minimal_view &&
|
|
206
|
+
pagination == o.pagination &&
|
|
195
207
|
pagination_token == o.pagination_token &&
|
|
196
208
|
path == o.path &&
|
|
197
209
|
sra_only == o.sra_only &&
|
|
@@ -211,7 +223,7 @@ module Akeyless
|
|
|
211
223
|
# Calculates hash code according to all attributes.
|
|
212
224
|
# @return [Integer] Hash code
|
|
213
225
|
def hash
|
|
214
|
-
[accessibility, filter, json, minimal_view, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
|
|
226
|
+
[accessibility, filter, json, minimal_view, pagination, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
|
|
215
227
|
end
|
|
216
228
|
|
|
217
229
|
# Builds the object from hash
|
|
@@ -46,6 +46,8 @@ module Akeyless
|
|
|
46
46
|
|
|
47
47
|
attr_accessor :target_name
|
|
48
48
|
|
|
49
|
+
attr_accessor :target_sub_type
|
|
50
|
+
|
|
49
51
|
attr_accessor :target_type
|
|
50
52
|
|
|
51
53
|
attr_accessor :target_versions
|
|
@@ -70,6 +72,7 @@ module Akeyless
|
|
|
70
72
|
:'target_id' => :'target_id',
|
|
71
73
|
:'target_items_assoc' => :'target_items_assoc',
|
|
72
74
|
:'target_name' => :'target_name',
|
|
75
|
+
:'target_sub_type' => :'target_sub_type',
|
|
73
76
|
:'target_type' => :'target_type',
|
|
74
77
|
:'target_versions' => :'target_versions',
|
|
75
78
|
:'with_customer_fragment' => :'with_customer_fragment'
|
|
@@ -99,6 +102,7 @@ module Akeyless
|
|
|
99
102
|
:'target_id' => :'Integer',
|
|
100
103
|
:'target_items_assoc' => :'Array<TargetItemAssociation>',
|
|
101
104
|
:'target_name' => :'String',
|
|
105
|
+
:'target_sub_type' => :'String',
|
|
102
106
|
:'target_type' => :'String',
|
|
103
107
|
:'target_versions' => :'Array<ItemVersion>',
|
|
104
108
|
:'with_customer_fragment' => :'Boolean'
|
|
@@ -192,6 +196,10 @@ module Akeyless
|
|
|
192
196
|
self.target_name = attributes[:'target_name']
|
|
193
197
|
end
|
|
194
198
|
|
|
199
|
+
if attributes.key?(:'target_sub_type')
|
|
200
|
+
self.target_sub_type = attributes[:'target_sub_type']
|
|
201
|
+
end
|
|
202
|
+
|
|
195
203
|
if attributes.key?(:'target_type')
|
|
196
204
|
self.target_type = attributes[:'target_type']
|
|
197
205
|
end
|
|
@@ -240,6 +248,7 @@ module Akeyless
|
|
|
240
248
|
target_id == o.target_id &&
|
|
241
249
|
target_items_assoc == o.target_items_assoc &&
|
|
242
250
|
target_name == o.target_name &&
|
|
251
|
+
target_sub_type == o.target_sub_type &&
|
|
243
252
|
target_type == o.target_type &&
|
|
244
253
|
target_versions == o.target_versions &&
|
|
245
254
|
with_customer_fragment == o.with_customer_fragment
|
|
@@ -254,7 +263,7 @@ module Akeyless
|
|
|
254
263
|
# Calculates hash code according to all attributes.
|
|
255
264
|
# @return [Integer] Hash code
|
|
256
265
|
def hash
|
|
257
|
-
[access_date, access_request_status, attributes, client_permissions, comment, creation_date, credentials_less, is_access_request_enabled, last_version, modification_date, protection_key_name, target_details, target_id, target_items_assoc, target_name, target_type, target_versions, with_customer_fragment].hash
|
|
266
|
+
[access_date, access_request_status, attributes, client_permissions, comment, creation_date, credentials_less, is_access_request_enabled, last_version, modification_date, protection_key_name, target_details, target_id, target_items_assoc, target_name, target_sub_type, target_type, target_versions, with_customer_fragment].hash
|
|
258
267
|
end
|
|
259
268
|
|
|
260
269
|
# Builds the object from hash
|
|
@@ -36,9 +36,12 @@ module Akeyless
|
|
|
36
36
|
# If set, certificates will be flagged for code signing use
|
|
37
37
|
attr_accessor :code_signing_flag
|
|
38
38
|
|
|
39
|
-
# A comma-separated list of
|
|
39
|
+
# A comma-separated list of countries that will be set in the issued certificate
|
|
40
40
|
attr_accessor :country
|
|
41
41
|
|
|
42
|
+
# Protection from accidental deletion of this item [true/false]
|
|
43
|
+
attr_accessor :delete_protection
|
|
44
|
+
|
|
42
45
|
# Description of the object
|
|
43
46
|
attr_accessor :description
|
|
44
47
|
|
|
@@ -57,7 +60,7 @@ module Akeyless
|
|
|
57
60
|
# key-usage
|
|
58
61
|
attr_accessor :key_usage
|
|
59
62
|
|
|
60
|
-
# A comma-separated list of
|
|
63
|
+
# A comma-separated list of localities that will be set in the issued certificate
|
|
61
64
|
attr_accessor :locality
|
|
62
65
|
|
|
63
66
|
# Deprecated - use description
|
|
@@ -81,13 +84,13 @@ module Akeyless
|
|
|
81
84
|
# A comma-separated list of organizations (O) that will be set in the issued certificate
|
|
82
85
|
attr_accessor :organizations
|
|
83
86
|
|
|
84
|
-
# A comma-separated list of
|
|
87
|
+
# A comma-separated list of postal codes that will be set in the issued certificate
|
|
85
88
|
attr_accessor :postal_code
|
|
86
89
|
|
|
87
90
|
# Whether to protect generated certificates from deletion
|
|
88
91
|
attr_accessor :protect_certificates
|
|
89
92
|
|
|
90
|
-
# A comma-separated list of
|
|
93
|
+
# A comma-separated list of provinces that will be set in the issued certificate
|
|
91
94
|
attr_accessor :province
|
|
92
95
|
|
|
93
96
|
# List of the existent tags that will be removed from this item
|
|
@@ -99,13 +102,13 @@ module Akeyless
|
|
|
99
102
|
# A key to sign the certificate with, required in Private CA mode
|
|
100
103
|
attr_accessor :signer_key_name
|
|
101
104
|
|
|
102
|
-
# A comma-separated list of
|
|
105
|
+
# A comma-separated list of street addresses that will be set in the issued certificate
|
|
103
106
|
attr_accessor :street_address
|
|
104
107
|
|
|
105
108
|
# Authentication token (see `/auth` and `/configure`)
|
|
106
109
|
attr_accessor :token
|
|
107
110
|
|
|
108
|
-
#
|
|
111
|
+
# The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs
|
|
109
112
|
attr_accessor :ttl
|
|
110
113
|
|
|
111
114
|
# The universal identity token, Required only for universal_identity authentication
|
|
@@ -122,6 +125,7 @@ module Akeyless
|
|
|
122
125
|
:'client_flag' => :'client-flag',
|
|
123
126
|
:'code_signing_flag' => :'code-signing-flag',
|
|
124
127
|
:'country' => :'country',
|
|
128
|
+
:'delete_protection' => :'delete_protection',
|
|
125
129
|
:'description' => :'description',
|
|
126
130
|
:'destination_path' => :'destination-path',
|
|
127
131
|
:'expiration_event_in' => :'expiration-event-in',
|
|
@@ -165,6 +169,7 @@ module Akeyless
|
|
|
165
169
|
:'client_flag' => :'Boolean',
|
|
166
170
|
:'code_signing_flag' => :'Boolean',
|
|
167
171
|
:'country' => :'String',
|
|
172
|
+
:'delete_protection' => :'String',
|
|
168
173
|
:'description' => :'String',
|
|
169
174
|
:'destination_path' => :'String',
|
|
170
175
|
:'expiration_event_in' => :'Array<String>',
|
|
@@ -247,6 +252,10 @@ module Akeyless
|
|
|
247
252
|
self.country = attributes[:'country']
|
|
248
253
|
end
|
|
249
254
|
|
|
255
|
+
if attributes.key?(:'delete_protection')
|
|
256
|
+
self.delete_protection = attributes[:'delete_protection']
|
|
257
|
+
end
|
|
258
|
+
|
|
250
259
|
if attributes.key?(:'description')
|
|
251
260
|
self.description = attributes[:'description']
|
|
252
261
|
end
|
|
@@ -395,6 +404,7 @@ module Akeyless
|
|
|
395
404
|
client_flag == o.client_flag &&
|
|
396
405
|
code_signing_flag == o.code_signing_flag &&
|
|
397
406
|
country == o.country &&
|
|
407
|
+
delete_protection == o.delete_protection &&
|
|
398
408
|
description == o.description &&
|
|
399
409
|
destination_path == o.destination_path &&
|
|
400
410
|
expiration_event_in == o.expiration_event_in &&
|
|
@@ -430,7 +440,7 @@ module Akeyless
|
|
|
430
440
|
# Calculates hash code according to all attributes.
|
|
431
441
|
# @return [Integer] Hash code
|
|
432
442
|
def hash
|
|
433
|
-
[add_tag, allow_any_name, allow_subdomains, allowed_domains, allowed_uri_sans, client_flag, code_signing_flag, country, description, destination_path, expiration_event_in, gw_cluster_url, json, key_usage, locality, metadata, name, new_name, not_enforce_hostnames, not_require_cn, organizational_units, organizations, postal_code, protect_certificates, province, rm_tag, server_flag, signer_key_name, street_address, token, ttl, uid_token].hash
|
|
443
|
+
[add_tag, allow_any_name, allow_subdomains, allowed_domains, allowed_uri_sans, client_flag, code_signing_flag, country, delete_protection, description, destination_path, expiration_event_in, gw_cluster_url, json, key_usage, locality, metadata, name, new_name, not_enforce_hostnames, not_require_cn, organizational_units, organizations, postal_code, protect_certificates, province, rm_tag, server_flag, signer_key_name, street_address, token, ttl, uid_token].hash
|
|
434
444
|
end
|
|
435
445
|
|
|
436
446
|
# Builds the object from hash
|
|
@@ -21,6 +21,9 @@ module Akeyless
|
|
|
21
21
|
# Users allowed to fetch the certificate, e.g root,ubuntu
|
|
22
22
|
attr_accessor :allowed_users
|
|
23
23
|
|
|
24
|
+
# Protection from accidental deletion of this item [true/false]
|
|
25
|
+
attr_accessor :delete_protection
|
|
26
|
+
|
|
24
27
|
# Description of the object
|
|
25
28
|
attr_accessor :description
|
|
26
29
|
|
|
@@ -69,7 +72,7 @@ module Akeyless
|
|
|
69
72
|
# Authentication token (see `/auth` and `/configure`)
|
|
70
73
|
attr_accessor :token
|
|
71
74
|
|
|
72
|
-
#
|
|
75
|
+
# The requested Time To Live for the certificate, in seconds
|
|
73
76
|
attr_accessor :ttl
|
|
74
77
|
|
|
75
78
|
# The universal identity token, Required only for universal_identity authentication
|
|
@@ -80,6 +83,7 @@ module Akeyless
|
|
|
80
83
|
{
|
|
81
84
|
:'add_tag' => :'add-tag',
|
|
82
85
|
:'allowed_users' => :'allowed-users',
|
|
86
|
+
:'delete_protection' => :'delete_protection',
|
|
83
87
|
:'description' => :'description',
|
|
84
88
|
:'extensions' => :'extensions',
|
|
85
89
|
:'json' => :'json',
|
|
@@ -111,6 +115,7 @@ module Akeyless
|
|
|
111
115
|
{
|
|
112
116
|
:'add_tag' => :'Array<String>',
|
|
113
117
|
:'allowed_users' => :'String',
|
|
118
|
+
:'delete_protection' => :'String',
|
|
114
119
|
:'description' => :'String',
|
|
115
120
|
:'extensions' => :'Hash<String, String>',
|
|
116
121
|
:'json' => :'Boolean',
|
|
@@ -163,6 +168,10 @@ module Akeyless
|
|
|
163
168
|
self.allowed_users = attributes[:'allowed_users']
|
|
164
169
|
end
|
|
165
170
|
|
|
171
|
+
if attributes.key?(:'delete_protection')
|
|
172
|
+
self.delete_protection = attributes[:'delete_protection']
|
|
173
|
+
end
|
|
174
|
+
|
|
166
175
|
if attributes.key?(:'description')
|
|
167
176
|
self.description = attributes[:'description']
|
|
168
177
|
end
|
|
@@ -284,6 +293,7 @@ module Akeyless
|
|
|
284
293
|
self.class == o.class &&
|
|
285
294
|
add_tag == o.add_tag &&
|
|
286
295
|
allowed_users == o.allowed_users &&
|
|
296
|
+
delete_protection == o.delete_protection &&
|
|
287
297
|
description == o.description &&
|
|
288
298
|
extensions == o.extensions &&
|
|
289
299
|
json == o.json &&
|
|
@@ -313,7 +323,7 @@ module Akeyless
|
|
|
313
323
|
# Calculates hash code according to all attributes.
|
|
314
324
|
# @return [Integer] Hash code
|
|
315
325
|
def hash
|
|
316
|
-
[add_tag, allowed_users, description, extensions, json, metadata, name, new_name, principals, rm_tag, secure_access_bastion_api, secure_access_bastion_ssh, secure_access_enable, secure_access_host, secure_access_ssh_creds_user, secure_access_use_internal_bastion, signer_key_name, token, ttl, uid_token].hash
|
|
326
|
+
[add_tag, allowed_users, delete_protection, description, extensions, json, metadata, name, new_name, principals, rm_tag, secure_access_bastion_api, secure_access_bastion_ssh, secure_access_enable, secure_access_host, secure_access_ssh_creds_user, secure_access_use_internal_bastion, signer_key_name, token, ttl, uid_token].hash
|
|
317
327
|
end
|
|
318
328
|
|
|
319
329
|
# Builds the object from hash
|
|
@@ -31,7 +31,7 @@ module Akeyless
|
|
|
31
31
|
attr_accessor :json
|
|
32
32
|
|
|
33
33
|
# The name of the key to use in the verification process
|
|
34
|
-
attr_accessor :
|
|
34
|
+
attr_accessor :name
|
|
35
35
|
|
|
36
36
|
# The data's signature in a Base64 format.
|
|
37
37
|
attr_accessor :signature
|
|
@@ -53,7 +53,7 @@ module Akeyless
|
|
|
53
53
|
:'hashed' => :'hashed',
|
|
54
54
|
:'hashing_method' => :'hashing-method',
|
|
55
55
|
:'json' => :'json',
|
|
56
|
-
:'
|
|
56
|
+
:'name' => :'name',
|
|
57
57
|
:'signature' => :'signature',
|
|
58
58
|
:'token' => :'token',
|
|
59
59
|
:'uid_token' => :'uid-token',
|
|
@@ -74,7 +74,7 @@ module Akeyless
|
|
|
74
74
|
:'hashed' => :'Boolean',
|
|
75
75
|
:'hashing_method' => :'String',
|
|
76
76
|
:'json' => :'Boolean',
|
|
77
|
-
:'
|
|
77
|
+
:'name' => :'String',
|
|
78
78
|
:'signature' => :'String',
|
|
79
79
|
:'token' => :'String',
|
|
80
80
|
:'uid_token' => :'String',
|
|
@@ -129,8 +129,8 @@ module Akeyless
|
|
|
129
129
|
self.json = false
|
|
130
130
|
end
|
|
131
131
|
|
|
132
|
-
if attributes.key?(:'
|
|
133
|
-
self.
|
|
132
|
+
if attributes.key?(:'name')
|
|
133
|
+
self.name = attributes[:'name']
|
|
134
134
|
end
|
|
135
135
|
|
|
136
136
|
if attributes.key?(:'signature')
|
|
@@ -158,8 +158,8 @@ module Akeyless
|
|
|
158
158
|
invalid_properties.push('invalid value for "data", data cannot be nil.')
|
|
159
159
|
end
|
|
160
160
|
|
|
161
|
-
if @
|
|
162
|
-
invalid_properties.push('invalid value for "
|
|
161
|
+
if @name.nil?
|
|
162
|
+
invalid_properties.push('invalid value for "name", name cannot be nil.')
|
|
163
163
|
end
|
|
164
164
|
|
|
165
165
|
if @signature.nil?
|
|
@@ -177,7 +177,7 @@ module Akeyless
|
|
|
177
177
|
# @return true if the model is valid
|
|
178
178
|
def valid?
|
|
179
179
|
return false if @data.nil?
|
|
180
|
-
return false if @
|
|
180
|
+
return false if @name.nil?
|
|
181
181
|
return false if @signature.nil?
|
|
182
182
|
return false if @version.nil?
|
|
183
183
|
true
|
|
@@ -193,7 +193,7 @@ module Akeyless
|
|
|
193
193
|
hashed == o.hashed &&
|
|
194
194
|
hashing_method == o.hashing_method &&
|
|
195
195
|
json == o.json &&
|
|
196
|
-
|
|
196
|
+
name == o.name &&
|
|
197
197
|
signature == o.signature &&
|
|
198
198
|
token == o.token &&
|
|
199
199
|
uid_token == o.uid_token &&
|
|
@@ -209,7 +209,7 @@ module Akeyless
|
|
|
209
209
|
# Calculates hash code according to all attributes.
|
|
210
210
|
# @return [Integer] Hash code
|
|
211
211
|
def hash
|
|
212
|
-
[data, display_id, hashed, hashing_method, json,
|
|
212
|
+
[data, display_id, hashed, hashing_method, json, name, signature, token, uid_token, version].hash
|
|
213
213
|
end
|
|
214
214
|
|
|
215
215
|
# Builds the object from hash
|
data/lib/akeyless/version.rb
CHANGED