akeyless 3.3.6 → 3.3.7

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 88435183182fc3482de93ad9a0f830797cc67e9e5aafab2909890be007eb81ca
4
- data.tar.gz: 4e1f05ab93344023684491d185b1cc9c125d5a2dde0720a21a29a18062e6e9d6
3
+ metadata.gz: a58478490360a3f9f0a7b9d706e40bfa139a39b0d09ed98da0b08f4764c553f4
4
+ data.tar.gz: bc3568f0358816e2eb54b127cba525c74ab744612db310fd3c75c5e3d5addbdd
5
5
  SHA512:
6
- metadata.gz: 1269021f5a1fce9f3c10242bd2f022049b7e5f5fc00e8eb7d7eb37f2c5b3098abd6d8e75be443d87c0de588ff248f527d70b0d06dc724fb48b1a2999f0c9d0b9
7
- data.tar.gz: 311419f0df3fadbc54bcf2fcd80b182e62af1cf331824cc6b8390851d2d4698b42dc9c5f0db061f17d98ddb780f9d7e38db7481b12207d73bfc4f6b7674df89e
6
+ metadata.gz: 37b4fe0e495ab7092c994f16b232f28bb49dc73f1d57a3b9a0d5775375d89033e5df4cc07b811cf5ff76acb2c4179d64909a7405844156e80f052e99f11cb949
7
+ data.tar.gz: 426d38b9eeec69d495294c1fef8439eed5b9b42ac077be15a8123992fe99353f7f57bfed0f3cb00cde326ccedfb88c73e3b00e0ca11561ccc7264c1a721f265d
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.6
10
+ - Package version: 3.3.7
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
data/docs/ListItems.md CHANGED
@@ -8,6 +8,7 @@
8
8
  | **filter** | **String** | Filter by item name or part of it | [optional] |
9
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
10
  | **minimal_view** | **Boolean** | | [optional] |
11
+ | **pagination** | **String** | Retrieve items with pagination | [optional][default to 'enabled'] |
11
12
  | **pagination_token** | **String** | Next page reference | [optional] |
12
13
  | **path** | **String** | Path to folder | [optional] |
13
14
  | **sra_only** | **Boolean** | Filter by items with SRA functionality enabled | [optional][default to false] |
@@ -27,6 +28,7 @@ instance = Akeyless::ListItems.new(
27
28
  filter: null,
28
29
  json: null,
29
30
  minimal_view: null,
31
+ pagination: null,
30
32
  pagination_token: null,
31
33
  path: null,
32
34
  sra_only: null,
data/docs/Target.md CHANGED
@@ -19,6 +19,7 @@
19
19
  | **target_id** | **Integer** | | [optional] |
20
20
  | **target_items_assoc** | [**Array<TargetItemAssociation>**](TargetItemAssociation.md) | | [optional] |
21
21
  | **target_name** | **String** | | [optional] |
22
+ | **target_sub_type** | **String** | | [optional] |
22
23
  | **target_type** | **String** | | [optional] |
23
24
  | **target_versions** | [**Array<ItemVersion>**](ItemVersion.md) | | [optional] |
24
25
  | **with_customer_fragment** | **Boolean** | | [optional] |
@@ -44,6 +45,7 @@ instance = Akeyless::Target.new(
44
45
  target_id: null,
45
46
  target_items_assoc: null,
46
47
  target_name: null,
48
+ target_sub_type: null,
47
49
  target_type: null,
48
50
  target_versions: null,
49
51
  with_customer_fragment: null
@@ -11,14 +11,15 @@
11
11
  | **allowed_uri_sans** | **String** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] |
12
12
  | **client_flag** | **Boolean** | If set, certificates will be flagged for client auth use | [optional] |
13
13
  | **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
14
- | **country** | **String** | A comma-separated list of the country that will be set in the issued certificate | [optional] |
14
+ | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
15
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
15
16
  | **description** | **String** | Description of the object | [optional] |
16
17
  | **destination_path** | **String** | A path in which to save generated certificates | [optional] |
17
18
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
18
19
  | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode | [optional] |
19
20
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
20
21
  | **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
21
- | **locality** | **String** | A comma-separated list of the locality that will be set in the issued certificate | [optional] |
22
+ | **locality** | **String** | A comma-separated list of localities that will be set in the issued certificate | [optional] |
22
23
  | **metadata** | **String** | Deprecated - use description | [optional] |
23
24
  | **name** | **String** | PKI certificate issuer name | |
24
25
  | **new_name** | **String** | New item name | [optional] |
@@ -26,15 +27,15 @@
26
27
  | **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
27
28
  | **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
28
29
  | **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
29
- | **postal_code** | **String** | A comma-separated list of the postal code that will be set in the issued certificate | [optional] |
30
+ | **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
30
31
  | **protect_certificates** | **Boolean** | Whether to protect generated certificates from deletion | [optional] |
31
- | **province** | **String** | A comma-separated list of the province that will be set in the issued certificate | [optional] |
32
+ | **province** | **String** | A comma-separated list of provinces that will be set in the issued certificate | [optional] |
32
33
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
33
34
  | **server_flag** | **Boolean** | If set, certificates will be flagged for server auth use | [optional] |
34
35
  | **signer_key_name** | **String** | A key to sign the certificate with, required in Private CA mode | [default to 'dummy_signer_key'] |
35
- | **street_address** | **String** | A comma-separated list of the street address that will be set in the issued certificate | [optional] |
36
+ | **street_address** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] |
36
37
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
37
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
38
+ | **ttl** | **Integer** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | |
38
39
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
39
40
 
40
41
  ## Example
@@ -51,6 +52,7 @@ instance = Akeyless::UpdatePKICertIssuer.new(
51
52
  client_flag: null,
52
53
  code_signing_flag: null,
53
54
  country: null,
55
+ delete_protection: null,
54
56
  description: null,
55
57
  destination_path: null,
56
58
  expiration_event_in: null,
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
8
8
  | **allowed_users** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | |
9
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
10
11
  | **extensions** | **Hash<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -22,7 +23,7 @@
22
23
  | **secure_access_use_internal_bastion** | **Boolean** | Use internal SSH Bastion | [optional] |
23
24
  | **signer_key_name** | **String** | A key to sign the certificate with | |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
25
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
26
+ | **ttl** | **Integer** | The requested Time To Live for the certificate, in seconds | |
26
27
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
27
28
 
28
29
  ## Example
@@ -33,6 +34,7 @@ require 'akeyless'
33
34
  instance = Akeyless::UpdateSSHCertIssuer.new(
34
35
  add_tag: null,
35
36
  allowed_users: null,
37
+ delete_protection: null,
36
38
  description: null,
37
39
  extensions: null,
38
40
  json: null,
data/docs/V2Api.md CHANGED
@@ -17430,7 +17430,7 @@ require 'time'
17430
17430
  require 'akeyless'
17431
17431
 
17432
17432
  api_instance = Akeyless::V2Api.new
17433
- body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example', key_name: 'key_name_example', signature: 'signature_example', version: 37}) # VerifyDataWithClassicKey |
17433
+ body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example', name: 'name_example', signature: 'signature_example', version: 37}) # VerifyDataWithClassicKey |
17434
17434
 
17435
17435
  begin
17436
17436
 
@@ -9,7 +9,7 @@
9
9
  | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
10
10
  | **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
11
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
- | **key_name** | **String** | The name of the key to use in the verification process | |
12
+ | **name** | **String** | The name of the key to use in the verification process | |
13
13
  | **signature** | **String** | The data's signature in a Base64 format. | |
14
14
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
15
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -26,7 +26,7 @@ instance = Akeyless::VerifyDataWithClassicKey.new(
26
26
  hashed: null,
27
27
  hashing_method: null,
28
28
  json: null,
29
- key_name: null,
29
+ name: null,
30
30
  signature: null,
31
31
  token: null,
32
32
  uid_token: null,
@@ -26,6 +26,9 @@ module Akeyless
26
26
 
27
27
  attr_accessor :minimal_view
28
28
 
29
+ # Retrieve items with pagination
30
+ attr_accessor :pagination
31
+
29
32
  # Next page reference
30
33
  attr_accessor :pagination_token
31
34
 
@@ -56,6 +59,7 @@ module Akeyless
56
59
  :'filter' => :'filter',
57
60
  :'json' => :'json',
58
61
  :'minimal_view' => :'minimal-view',
62
+ :'pagination' => :'pagination',
59
63
  :'pagination_token' => :'pagination-token',
60
64
  :'path' => :'path',
61
65
  :'sra_only' => :'sra-only',
@@ -79,6 +83,7 @@ module Akeyless
79
83
  :'filter' => :'String',
80
84
  :'json' => :'Boolean',
81
85
  :'minimal_view' => :'Boolean',
86
+ :'pagination' => :'String',
82
87
  :'pagination_token' => :'String',
83
88
  :'path' => :'String',
84
89
  :'sra_only' => :'Boolean',
@@ -131,6 +136,12 @@ module Akeyless
131
136
  self.minimal_view = attributes[:'minimal_view']
132
137
  end
133
138
 
139
+ if attributes.key?(:'pagination')
140
+ self.pagination = attributes[:'pagination']
141
+ else
142
+ self.pagination = 'enabled'
143
+ end
144
+
134
145
  if attributes.key?(:'pagination_token')
135
146
  self.pagination_token = attributes[:'pagination_token']
136
147
  end
@@ -192,6 +203,7 @@ module Akeyless
192
203
  filter == o.filter &&
193
204
  json == o.json &&
194
205
  minimal_view == o.minimal_view &&
206
+ pagination == o.pagination &&
195
207
  pagination_token == o.pagination_token &&
196
208
  path == o.path &&
197
209
  sra_only == o.sra_only &&
@@ -211,7 +223,7 @@ module Akeyless
211
223
  # Calculates hash code according to all attributes.
212
224
  # @return [Integer] Hash code
213
225
  def hash
214
- [accessibility, filter, json, minimal_view, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
226
+ [accessibility, filter, json, minimal_view, pagination, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
215
227
  end
216
228
 
217
229
  # Builds the object from hash
@@ -46,6 +46,8 @@ module Akeyless
46
46
 
47
47
  attr_accessor :target_name
48
48
 
49
+ attr_accessor :target_sub_type
50
+
49
51
  attr_accessor :target_type
50
52
 
51
53
  attr_accessor :target_versions
@@ -70,6 +72,7 @@ module Akeyless
70
72
  :'target_id' => :'target_id',
71
73
  :'target_items_assoc' => :'target_items_assoc',
72
74
  :'target_name' => :'target_name',
75
+ :'target_sub_type' => :'target_sub_type',
73
76
  :'target_type' => :'target_type',
74
77
  :'target_versions' => :'target_versions',
75
78
  :'with_customer_fragment' => :'with_customer_fragment'
@@ -99,6 +102,7 @@ module Akeyless
99
102
  :'target_id' => :'Integer',
100
103
  :'target_items_assoc' => :'Array<TargetItemAssociation>',
101
104
  :'target_name' => :'String',
105
+ :'target_sub_type' => :'String',
102
106
  :'target_type' => :'String',
103
107
  :'target_versions' => :'Array<ItemVersion>',
104
108
  :'with_customer_fragment' => :'Boolean'
@@ -192,6 +196,10 @@ module Akeyless
192
196
  self.target_name = attributes[:'target_name']
193
197
  end
194
198
 
199
+ if attributes.key?(:'target_sub_type')
200
+ self.target_sub_type = attributes[:'target_sub_type']
201
+ end
202
+
195
203
  if attributes.key?(:'target_type')
196
204
  self.target_type = attributes[:'target_type']
197
205
  end
@@ -240,6 +248,7 @@ module Akeyless
240
248
  target_id == o.target_id &&
241
249
  target_items_assoc == o.target_items_assoc &&
242
250
  target_name == o.target_name &&
251
+ target_sub_type == o.target_sub_type &&
243
252
  target_type == o.target_type &&
244
253
  target_versions == o.target_versions &&
245
254
  with_customer_fragment == o.with_customer_fragment
@@ -254,7 +263,7 @@ module Akeyless
254
263
  # Calculates hash code according to all attributes.
255
264
  # @return [Integer] Hash code
256
265
  def hash
257
- [access_date, access_request_status, attributes, client_permissions, comment, creation_date, credentials_less, is_access_request_enabled, last_version, modification_date, protection_key_name, target_details, target_id, target_items_assoc, target_name, target_type, target_versions, with_customer_fragment].hash
266
+ [access_date, access_request_status, attributes, client_permissions, comment, creation_date, credentials_less, is_access_request_enabled, last_version, modification_date, protection_key_name, target_details, target_id, target_items_assoc, target_name, target_sub_type, target_type, target_versions, with_customer_fragment].hash
258
267
  end
259
268
 
260
269
  # Builds the object from hash
@@ -36,9 +36,12 @@ module Akeyless
36
36
  # If set, certificates will be flagged for code signing use
37
37
  attr_accessor :code_signing_flag
38
38
 
39
- # A comma-separated list of the country that will be set in the issued certificate
39
+ # A comma-separated list of countries that will be set in the issued certificate
40
40
  attr_accessor :country
41
41
 
42
+ # Protection from accidental deletion of this item [true/false]
43
+ attr_accessor :delete_protection
44
+
42
45
  # Description of the object
43
46
  attr_accessor :description
44
47
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # key-usage
58
61
  attr_accessor :key_usage
59
62
 
60
- # A comma-separated list of the locality that will be set in the issued certificate
63
+ # A comma-separated list of localities that will be set in the issued certificate
61
64
  attr_accessor :locality
62
65
 
63
66
  # Deprecated - use description
@@ -81,13 +84,13 @@ module Akeyless
81
84
  # A comma-separated list of organizations (O) that will be set in the issued certificate
82
85
  attr_accessor :organizations
83
86
 
84
- # A comma-separated list of the postal code that will be set in the issued certificate
87
+ # A comma-separated list of postal codes that will be set in the issued certificate
85
88
  attr_accessor :postal_code
86
89
 
87
90
  # Whether to protect generated certificates from deletion
88
91
  attr_accessor :protect_certificates
89
92
 
90
- # A comma-separated list of the province that will be set in the issued certificate
93
+ # A comma-separated list of provinces that will be set in the issued certificate
91
94
  attr_accessor :province
92
95
 
93
96
  # List of the existent tags that will be removed from this item
@@ -99,13 +102,13 @@ module Akeyless
99
102
  # A key to sign the certificate with, required in Private CA mode
100
103
  attr_accessor :signer_key_name
101
104
 
102
- # A comma-separated list of the street address that will be set in the issued certificate
105
+ # A comma-separated list of street addresses that will be set in the issued certificate
103
106
  attr_accessor :street_address
104
107
 
105
108
  # Authentication token (see `/auth` and `/configure`)
106
109
  attr_accessor :token
107
110
 
108
- # he requested Time To Live for the certificate, in seconds
111
+ # The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs
109
112
  attr_accessor :ttl
110
113
 
111
114
  # The universal identity token, Required only for universal_identity authentication
@@ -122,6 +125,7 @@ module Akeyless
122
125
  :'client_flag' => :'client-flag',
123
126
  :'code_signing_flag' => :'code-signing-flag',
124
127
  :'country' => :'country',
128
+ :'delete_protection' => :'delete_protection',
125
129
  :'description' => :'description',
126
130
  :'destination_path' => :'destination-path',
127
131
  :'expiration_event_in' => :'expiration-event-in',
@@ -165,6 +169,7 @@ module Akeyless
165
169
  :'client_flag' => :'Boolean',
166
170
  :'code_signing_flag' => :'Boolean',
167
171
  :'country' => :'String',
172
+ :'delete_protection' => :'String',
168
173
  :'description' => :'String',
169
174
  :'destination_path' => :'String',
170
175
  :'expiration_event_in' => :'Array<String>',
@@ -247,6 +252,10 @@ module Akeyless
247
252
  self.country = attributes[:'country']
248
253
  end
249
254
 
255
+ if attributes.key?(:'delete_protection')
256
+ self.delete_protection = attributes[:'delete_protection']
257
+ end
258
+
250
259
  if attributes.key?(:'description')
251
260
  self.description = attributes[:'description']
252
261
  end
@@ -395,6 +404,7 @@ module Akeyless
395
404
  client_flag == o.client_flag &&
396
405
  code_signing_flag == o.code_signing_flag &&
397
406
  country == o.country &&
407
+ delete_protection == o.delete_protection &&
398
408
  description == o.description &&
399
409
  destination_path == o.destination_path &&
400
410
  expiration_event_in == o.expiration_event_in &&
@@ -430,7 +440,7 @@ module Akeyless
430
440
  # Calculates hash code according to all attributes.
431
441
  # @return [Integer] Hash code
432
442
  def hash
433
- [add_tag, allow_any_name, allow_subdomains, allowed_domains, allowed_uri_sans, client_flag, code_signing_flag, country, description, destination_path, expiration_event_in, gw_cluster_url, json, key_usage, locality, metadata, name, new_name, not_enforce_hostnames, not_require_cn, organizational_units, organizations, postal_code, protect_certificates, province, rm_tag, server_flag, signer_key_name, street_address, token, ttl, uid_token].hash
443
+ [add_tag, allow_any_name, allow_subdomains, allowed_domains, allowed_uri_sans, client_flag, code_signing_flag, country, delete_protection, description, destination_path, expiration_event_in, gw_cluster_url, json, key_usage, locality, metadata, name, new_name, not_enforce_hostnames, not_require_cn, organizational_units, organizations, postal_code, protect_certificates, province, rm_tag, server_flag, signer_key_name, street_address, token, ttl, uid_token].hash
434
444
  end
435
445
 
436
446
  # Builds the object from hash
@@ -21,6 +21,9 @@ module Akeyless
21
21
  # Users allowed to fetch the certificate, e.g root,ubuntu
22
22
  attr_accessor :allowed_users
23
23
 
24
+ # Protection from accidental deletion of this item [true/false]
25
+ attr_accessor :delete_protection
26
+
24
27
  # Description of the object
25
28
  attr_accessor :description
26
29
 
@@ -69,7 +72,7 @@ module Akeyless
69
72
  # Authentication token (see `/auth` and `/configure`)
70
73
  attr_accessor :token
71
74
 
72
- # he requested Time To Live for the certificate, in seconds
75
+ # The requested Time To Live for the certificate, in seconds
73
76
  attr_accessor :ttl
74
77
 
75
78
  # The universal identity token, Required only for universal_identity authentication
@@ -80,6 +83,7 @@ module Akeyless
80
83
  {
81
84
  :'add_tag' => :'add-tag',
82
85
  :'allowed_users' => :'allowed-users',
86
+ :'delete_protection' => :'delete_protection',
83
87
  :'description' => :'description',
84
88
  :'extensions' => :'extensions',
85
89
  :'json' => :'json',
@@ -111,6 +115,7 @@ module Akeyless
111
115
  {
112
116
  :'add_tag' => :'Array<String>',
113
117
  :'allowed_users' => :'String',
118
+ :'delete_protection' => :'String',
114
119
  :'description' => :'String',
115
120
  :'extensions' => :'Hash<String, String>',
116
121
  :'json' => :'Boolean',
@@ -163,6 +168,10 @@ module Akeyless
163
168
  self.allowed_users = attributes[:'allowed_users']
164
169
  end
165
170
 
171
+ if attributes.key?(:'delete_protection')
172
+ self.delete_protection = attributes[:'delete_protection']
173
+ end
174
+
166
175
  if attributes.key?(:'description')
167
176
  self.description = attributes[:'description']
168
177
  end
@@ -284,6 +293,7 @@ module Akeyless
284
293
  self.class == o.class &&
285
294
  add_tag == o.add_tag &&
286
295
  allowed_users == o.allowed_users &&
296
+ delete_protection == o.delete_protection &&
287
297
  description == o.description &&
288
298
  extensions == o.extensions &&
289
299
  json == o.json &&
@@ -313,7 +323,7 @@ module Akeyless
313
323
  # Calculates hash code according to all attributes.
314
324
  # @return [Integer] Hash code
315
325
  def hash
316
- [add_tag, allowed_users, description, extensions, json, metadata, name, new_name, principals, rm_tag, secure_access_bastion_api, secure_access_bastion_ssh, secure_access_enable, secure_access_host, secure_access_ssh_creds_user, secure_access_use_internal_bastion, signer_key_name, token, ttl, uid_token].hash
326
+ [add_tag, allowed_users, delete_protection, description, extensions, json, metadata, name, new_name, principals, rm_tag, secure_access_bastion_api, secure_access_bastion_ssh, secure_access_enable, secure_access_host, secure_access_ssh_creds_user, secure_access_use_internal_bastion, signer_key_name, token, ttl, uid_token].hash
317
327
  end
318
328
 
319
329
  # Builds the object from hash
@@ -31,7 +31,7 @@ module Akeyless
31
31
  attr_accessor :json
32
32
 
33
33
  # The name of the key to use in the verification process
34
- attr_accessor :key_name
34
+ attr_accessor :name
35
35
 
36
36
  # The data's signature in a Base64 format.
37
37
  attr_accessor :signature
@@ -53,7 +53,7 @@ module Akeyless
53
53
  :'hashed' => :'hashed',
54
54
  :'hashing_method' => :'hashing-method',
55
55
  :'json' => :'json',
56
- :'key_name' => :'key-name',
56
+ :'name' => :'name',
57
57
  :'signature' => :'signature',
58
58
  :'token' => :'token',
59
59
  :'uid_token' => :'uid-token',
@@ -74,7 +74,7 @@ module Akeyless
74
74
  :'hashed' => :'Boolean',
75
75
  :'hashing_method' => :'String',
76
76
  :'json' => :'Boolean',
77
- :'key_name' => :'String',
77
+ :'name' => :'String',
78
78
  :'signature' => :'String',
79
79
  :'token' => :'String',
80
80
  :'uid_token' => :'String',
@@ -129,8 +129,8 @@ module Akeyless
129
129
  self.json = false
130
130
  end
131
131
 
132
- if attributes.key?(:'key_name')
133
- self.key_name = attributes[:'key_name']
132
+ if attributes.key?(:'name')
133
+ self.name = attributes[:'name']
134
134
  end
135
135
 
136
136
  if attributes.key?(:'signature')
@@ -158,8 +158,8 @@ module Akeyless
158
158
  invalid_properties.push('invalid value for "data", data cannot be nil.')
159
159
  end
160
160
 
161
- if @key_name.nil?
162
- invalid_properties.push('invalid value for "key_name", key_name cannot be nil.')
161
+ if @name.nil?
162
+ invalid_properties.push('invalid value for "name", name cannot be nil.')
163
163
  end
164
164
 
165
165
  if @signature.nil?
@@ -177,7 +177,7 @@ module Akeyless
177
177
  # @return true if the model is valid
178
178
  def valid?
179
179
  return false if @data.nil?
180
- return false if @key_name.nil?
180
+ return false if @name.nil?
181
181
  return false if @signature.nil?
182
182
  return false if @version.nil?
183
183
  true
@@ -193,7 +193,7 @@ module Akeyless
193
193
  hashed == o.hashed &&
194
194
  hashing_method == o.hashing_method &&
195
195
  json == o.json &&
196
- key_name == o.key_name &&
196
+ name == o.name &&
197
197
  signature == o.signature &&
198
198
  token == o.token &&
199
199
  uid_token == o.uid_token &&
@@ -209,7 +209,7 @@ module Akeyless
209
209
  # Calculates hash code according to all attributes.
210
210
  # @return [Integer] Hash code
211
211
  def hash
212
- [data, display_id, hashed, hashing_method, json, key_name, signature, token, uid_token, version].hash
212
+ [data, display_id, hashed, hashing_method, json, name, signature, token, uid_token, version].hash
213
213
  end
214
214
 
215
215
  # Builds the object from hash
@@ -11,5 +11,5 @@ OpenAPI Generator version: 7.0.0-SNAPSHOT
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '3.3.6'
14
+ VERSION = '3.3.7'
15
15
  end