akeyless 3.3.6 → 3.3.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 88435183182fc3482de93ad9a0f830797cc67e9e5aafab2909890be007eb81ca
4
- data.tar.gz: 4e1f05ab93344023684491d185b1cc9c125d5a2dde0720a21a29a18062e6e9d6
3
+ metadata.gz: a58478490360a3f9f0a7b9d706e40bfa139a39b0d09ed98da0b08f4764c553f4
4
+ data.tar.gz: bc3568f0358816e2eb54b127cba525c74ab744612db310fd3c75c5e3d5addbdd
5
5
  SHA512:
6
- metadata.gz: 1269021f5a1fce9f3c10242bd2f022049b7e5f5fc00e8eb7d7eb37f2c5b3098abd6d8e75be443d87c0de588ff248f527d70b0d06dc724fb48b1a2999f0c9d0b9
7
- data.tar.gz: 311419f0df3fadbc54bcf2fcd80b182e62af1cf331824cc6b8390851d2d4698b42dc9c5f0db061f17d98ddb780f9d7e38db7481b12207d73bfc4f6b7674df89e
6
+ metadata.gz: 37b4fe0e495ab7092c994f16b232f28bb49dc73f1d57a3b9a0d5775375d89033e5df4cc07b811cf5ff76acb2c4179d64909a7405844156e80f052e99f11cb949
7
+ data.tar.gz: 426d38b9eeec69d495294c1fef8439eed5b9b42ac077be15a8123992fe99353f7f57bfed0f3cb00cde326ccedfb88c73e3b00e0ca11561ccc7264c1a721f265d
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.6
10
+ - Package version: 3.3.7
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
data/docs/ListItems.md CHANGED
@@ -8,6 +8,7 @@
8
8
  | **filter** | **String** | Filter by item name or part of it | [optional] |
9
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
10
  | **minimal_view** | **Boolean** | | [optional] |
11
+ | **pagination** | **String** | Retrieve items with pagination | [optional][default to 'enabled'] |
11
12
  | **pagination_token** | **String** | Next page reference | [optional] |
12
13
  | **path** | **String** | Path to folder | [optional] |
13
14
  | **sra_only** | **Boolean** | Filter by items with SRA functionality enabled | [optional][default to false] |
@@ -27,6 +28,7 @@ instance = Akeyless::ListItems.new(
27
28
  filter: null,
28
29
  json: null,
29
30
  minimal_view: null,
31
+ pagination: null,
30
32
  pagination_token: null,
31
33
  path: null,
32
34
  sra_only: null,
data/docs/Target.md CHANGED
@@ -19,6 +19,7 @@
19
19
  | **target_id** | **Integer** | | [optional] |
20
20
  | **target_items_assoc** | [**Array<TargetItemAssociation>**](TargetItemAssociation.md) | | [optional] |
21
21
  | **target_name** | **String** | | [optional] |
22
+ | **target_sub_type** | **String** | | [optional] |
22
23
  | **target_type** | **String** | | [optional] |
23
24
  | **target_versions** | [**Array<ItemVersion>**](ItemVersion.md) | | [optional] |
24
25
  | **with_customer_fragment** | **Boolean** | | [optional] |
@@ -44,6 +45,7 @@ instance = Akeyless::Target.new(
44
45
  target_id: null,
45
46
  target_items_assoc: null,
46
47
  target_name: null,
48
+ target_sub_type: null,
47
49
  target_type: null,
48
50
  target_versions: null,
49
51
  with_customer_fragment: null
@@ -11,14 +11,15 @@
11
11
  | **allowed_uri_sans** | **String** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] |
12
12
  | **client_flag** | **Boolean** | If set, certificates will be flagged for client auth use | [optional] |
13
13
  | **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
14
- | **country** | **String** | A comma-separated list of the country that will be set in the issued certificate | [optional] |
14
+ | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
15
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
15
16
  | **description** | **String** | Description of the object | [optional] |
16
17
  | **destination_path** | **String** | A path in which to save generated certificates | [optional] |
17
18
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
18
19
  | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode | [optional] |
19
20
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
20
21
  | **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
21
- | **locality** | **String** | A comma-separated list of the locality that will be set in the issued certificate | [optional] |
22
+ | **locality** | **String** | A comma-separated list of localities that will be set in the issued certificate | [optional] |
22
23
  | **metadata** | **String** | Deprecated - use description | [optional] |
23
24
  | **name** | **String** | PKI certificate issuer name | |
24
25
  | **new_name** | **String** | New item name | [optional] |
@@ -26,15 +27,15 @@
26
27
  | **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
27
28
  | **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
28
29
  | **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
29
- | **postal_code** | **String** | A comma-separated list of the postal code that will be set in the issued certificate | [optional] |
30
+ | **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
30
31
  | **protect_certificates** | **Boolean** | Whether to protect generated certificates from deletion | [optional] |
31
- | **province** | **String** | A comma-separated list of the province that will be set in the issued certificate | [optional] |
32
+ | **province** | **String** | A comma-separated list of provinces that will be set in the issued certificate | [optional] |
32
33
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
33
34
  | **server_flag** | **Boolean** | If set, certificates will be flagged for server auth use | [optional] |
34
35
  | **signer_key_name** | **String** | A key to sign the certificate with, required in Private CA mode | [default to 'dummy_signer_key'] |
35
- | **street_address** | **String** | A comma-separated list of the street address that will be set in the issued certificate | [optional] |
36
+ | **street_address** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] |
36
37
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
37
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
38
+ | **ttl** | **Integer** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | |
38
39
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
39
40
 
40
41
  ## Example
@@ -51,6 +52,7 @@ instance = Akeyless::UpdatePKICertIssuer.new(
51
52
  client_flag: null,
52
53
  code_signing_flag: null,
53
54
  country: null,
55
+ delete_protection: null,
54
56
  description: null,
55
57
  destination_path: null,
56
58
  expiration_event_in: null,
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
8
8
  | **allowed_users** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | |
9
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
10
11
  | **extensions** | **Hash<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -22,7 +23,7 @@
22
23
  | **secure_access_use_internal_bastion** | **Boolean** | Use internal SSH Bastion | [optional] |
23
24
  | **signer_key_name** | **String** | A key to sign the certificate with | |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
25
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
26
+ | **ttl** | **Integer** | The requested Time To Live for the certificate, in seconds | |
26
27
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
27
28
 
28
29
  ## Example
@@ -33,6 +34,7 @@ require 'akeyless'
33
34
  instance = Akeyless::UpdateSSHCertIssuer.new(
34
35
  add_tag: null,
35
36
  allowed_users: null,
37
+ delete_protection: null,
36
38
  description: null,
37
39
  extensions: null,
38
40
  json: null,
data/docs/V2Api.md CHANGED
@@ -17430,7 +17430,7 @@ require 'time'
17430
17430
  require 'akeyless'
17431
17431
 
17432
17432
  api_instance = Akeyless::V2Api.new
17433
- body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example', key_name: 'key_name_example', signature: 'signature_example', version: 37}) # VerifyDataWithClassicKey |
17433
+ body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example', name: 'name_example', signature: 'signature_example', version: 37}) # VerifyDataWithClassicKey |
17434
17434
 
17435
17435
  begin
17436
17436
 
@@ -9,7 +9,7 @@
9
9
  | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
10
10
  | **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
11
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
- | **key_name** | **String** | The name of the key to use in the verification process | |
12
+ | **name** | **String** | The name of the key to use in the verification process | |
13
13
  | **signature** | **String** | The data's signature in a Base64 format. | |
14
14
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
15
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -26,7 +26,7 @@ instance = Akeyless::VerifyDataWithClassicKey.new(
26
26
  hashed: null,
27
27
  hashing_method: null,
28
28
  json: null,
29
- key_name: null,
29
+ name: null,
30
30
  signature: null,
31
31
  token: null,
32
32
  uid_token: null,
@@ -26,6 +26,9 @@ module Akeyless
26
26
 
27
27
  attr_accessor :minimal_view
28
28
 
29
+ # Retrieve items with pagination
30
+ attr_accessor :pagination
31
+
29
32
  # Next page reference
30
33
  attr_accessor :pagination_token
31
34
 
@@ -56,6 +59,7 @@ module Akeyless
56
59
  :'filter' => :'filter',
57
60
  :'json' => :'json',
58
61
  :'minimal_view' => :'minimal-view',
62
+ :'pagination' => :'pagination',
59
63
  :'pagination_token' => :'pagination-token',
60
64
  :'path' => :'path',
61
65
  :'sra_only' => :'sra-only',
@@ -79,6 +83,7 @@ module Akeyless
79
83
  :'filter' => :'String',
80
84
  :'json' => :'Boolean',
81
85
  :'minimal_view' => :'Boolean',
86
+ :'pagination' => :'String',
82
87
  :'pagination_token' => :'String',
83
88
  :'path' => :'String',
84
89
  :'sra_only' => :'Boolean',
@@ -131,6 +136,12 @@ module Akeyless
131
136
  self.minimal_view = attributes[:'minimal_view']
132
137
  end
133
138
 
139
+ if attributes.key?(:'pagination')
140
+ self.pagination = attributes[:'pagination']
141
+ else
142
+ self.pagination = 'enabled'
143
+ end
144
+
134
145
  if attributes.key?(:'pagination_token')
135
146
  self.pagination_token = attributes[:'pagination_token']
136
147
  end
@@ -192,6 +203,7 @@ module Akeyless
192
203
  filter == o.filter &&
193
204
  json == o.json &&
194
205
  minimal_view == o.minimal_view &&
206
+ pagination == o.pagination &&
195
207
  pagination_token == o.pagination_token &&
196
208
  path == o.path &&
197
209
  sra_only == o.sra_only &&
@@ -211,7 +223,7 @@ module Akeyless
211
223
  # Calculates hash code according to all attributes.
212
224
  # @return [Integer] Hash code
213
225
  def hash
214
- [accessibility, filter, json, minimal_view, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
226
+ [accessibility, filter, json, minimal_view, pagination, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
215
227
  end
216
228
 
217
229
  # Builds the object from hash
@@ -46,6 +46,8 @@ module Akeyless
46
46
 
47
47
  attr_accessor :target_name
48
48
 
49
+ attr_accessor :target_sub_type
50
+
49
51
  attr_accessor :target_type
50
52
 
51
53
  attr_accessor :target_versions
@@ -70,6 +72,7 @@ module Akeyless
70
72
  :'target_id' => :'target_id',
71
73
  :'target_items_assoc' => :'target_items_assoc',
72
74
  :'target_name' => :'target_name',
75
+ :'target_sub_type' => :'target_sub_type',
73
76
  :'target_type' => :'target_type',
74
77
  :'target_versions' => :'target_versions',
75
78
  :'with_customer_fragment' => :'with_customer_fragment'
@@ -99,6 +102,7 @@ module Akeyless
99
102
  :'target_id' => :'Integer',
100
103
  :'target_items_assoc' => :'Array<TargetItemAssociation>',
101
104
  :'target_name' => :'String',
105
+ :'target_sub_type' => :'String',
102
106
  :'target_type' => :'String',
103
107
  :'target_versions' => :'Array<ItemVersion>',
104
108
  :'with_customer_fragment' => :'Boolean'
@@ -192,6 +196,10 @@ module Akeyless
192
196
  self.target_name = attributes[:'target_name']
193
197
  end
194
198
 
199
+ if attributes.key?(:'target_sub_type')
200
+ self.target_sub_type = attributes[:'target_sub_type']
201
+ end
202
+
195
203
  if attributes.key?(:'target_type')
196
204
  self.target_type = attributes[:'target_type']
197
205
  end
@@ -240,6 +248,7 @@ module Akeyless
240
248
  target_id == o.target_id &&
241
249
  target_items_assoc == o.target_items_assoc &&
242
250
  target_name == o.target_name &&
251
+ target_sub_type == o.target_sub_type &&
243
252
  target_type == o.target_type &&
244
253
  target_versions == o.target_versions &&
245
254
  with_customer_fragment == o.with_customer_fragment
@@ -254,7 +263,7 @@ module Akeyless
254
263
  # Calculates hash code according to all attributes.
255
264
  # @return [Integer] Hash code
256
265
  def hash
257
- [access_date, access_request_status, attributes, client_permissions, comment, creation_date, credentials_less, is_access_request_enabled, last_version, modification_date, protection_key_name, target_details, target_id, target_items_assoc, target_name, target_type, target_versions, with_customer_fragment].hash
266
+ [access_date, access_request_status, attributes, client_permissions, comment, creation_date, credentials_less, is_access_request_enabled, last_version, modification_date, protection_key_name, target_details, target_id, target_items_assoc, target_name, target_sub_type, target_type, target_versions, with_customer_fragment].hash
258
267
  end
259
268
 
260
269
  # Builds the object from hash
@@ -36,9 +36,12 @@ module Akeyless
36
36
  # If set, certificates will be flagged for code signing use
37
37
  attr_accessor :code_signing_flag
38
38
 
39
- # A comma-separated list of the country that will be set in the issued certificate
39
+ # A comma-separated list of countries that will be set in the issued certificate
40
40
  attr_accessor :country
41
41
 
42
+ # Protection from accidental deletion of this item [true/false]
43
+ attr_accessor :delete_protection
44
+
42
45
  # Description of the object
43
46
  attr_accessor :description
44
47
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # key-usage
58
61
  attr_accessor :key_usage
59
62
 
60
- # A comma-separated list of the locality that will be set in the issued certificate
63
+ # A comma-separated list of localities that will be set in the issued certificate
61
64
  attr_accessor :locality
62
65
 
63
66
  # Deprecated - use description
@@ -81,13 +84,13 @@ module Akeyless
81
84
  # A comma-separated list of organizations (O) that will be set in the issued certificate
82
85
  attr_accessor :organizations
83
86
 
84
- # A comma-separated list of the postal code that will be set in the issued certificate
87
+ # A comma-separated list of postal codes that will be set in the issued certificate
85
88
  attr_accessor :postal_code
86
89
 
87
90
  # Whether to protect generated certificates from deletion
88
91
  attr_accessor :protect_certificates
89
92
 
90
- # A comma-separated list of the province that will be set in the issued certificate
93
+ # A comma-separated list of provinces that will be set in the issued certificate
91
94
  attr_accessor :province
92
95
 
93
96
  # List of the existent tags that will be removed from this item
@@ -99,13 +102,13 @@ module Akeyless
99
102
  # A key to sign the certificate with, required in Private CA mode
100
103
  attr_accessor :signer_key_name
101
104
 
102
- # A comma-separated list of the street address that will be set in the issued certificate
105
+ # A comma-separated list of street addresses that will be set in the issued certificate
103
106
  attr_accessor :street_address
104
107
 
105
108
  # Authentication token (see `/auth` and `/configure`)
106
109
  attr_accessor :token
107
110
 
108
- # he requested Time To Live for the certificate, in seconds
111
+ # The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs
109
112
  attr_accessor :ttl
110
113
 
111
114
  # The universal identity token, Required only for universal_identity authentication
@@ -122,6 +125,7 @@ module Akeyless
122
125
  :'client_flag' => :'client-flag',
123
126
  :'code_signing_flag' => :'code-signing-flag',
124
127
  :'country' => :'country',
128
+ :'delete_protection' => :'delete_protection',
125
129
  :'description' => :'description',
126
130
  :'destination_path' => :'destination-path',
127
131
  :'expiration_event_in' => :'expiration-event-in',
@@ -165,6 +169,7 @@ module Akeyless
165
169
  :'client_flag' => :'Boolean',
166
170
  :'code_signing_flag' => :'Boolean',
167
171
  :'country' => :'String',
172
+ :'delete_protection' => :'String',
168
173
  :'description' => :'String',
169
174
  :'destination_path' => :'String',
170
175
  :'expiration_event_in' => :'Array<String>',
@@ -247,6 +252,10 @@ module Akeyless
247
252
  self.country = attributes[:'country']
248
253
  end
249
254
 
255
+ if attributes.key?(:'delete_protection')
256
+ self.delete_protection = attributes[:'delete_protection']
257
+ end
258
+
250
259
  if attributes.key?(:'description')
251
260
  self.description = attributes[:'description']
252
261
  end
@@ -395,6 +404,7 @@ module Akeyless
395
404
  client_flag == o.client_flag &&
396
405
  code_signing_flag == o.code_signing_flag &&
397
406
  country == o.country &&
407
+ delete_protection == o.delete_protection &&
398
408
  description == o.description &&
399
409
  destination_path == o.destination_path &&
400
410
  expiration_event_in == o.expiration_event_in &&
@@ -430,7 +440,7 @@ module Akeyless
430
440
  # Calculates hash code according to all attributes.
431
441
  # @return [Integer] Hash code
432
442
  def hash
433
- [add_tag, allow_any_name, allow_subdomains, allowed_domains, allowed_uri_sans, client_flag, code_signing_flag, country, description, destination_path, expiration_event_in, gw_cluster_url, json, key_usage, locality, metadata, name, new_name, not_enforce_hostnames, not_require_cn, organizational_units, organizations, postal_code, protect_certificates, province, rm_tag, server_flag, signer_key_name, street_address, token, ttl, uid_token].hash
443
+ [add_tag, allow_any_name, allow_subdomains, allowed_domains, allowed_uri_sans, client_flag, code_signing_flag, country, delete_protection, description, destination_path, expiration_event_in, gw_cluster_url, json, key_usage, locality, metadata, name, new_name, not_enforce_hostnames, not_require_cn, organizational_units, organizations, postal_code, protect_certificates, province, rm_tag, server_flag, signer_key_name, street_address, token, ttl, uid_token].hash
434
444
  end
435
445
 
436
446
  # Builds the object from hash
@@ -21,6 +21,9 @@ module Akeyless
21
21
  # Users allowed to fetch the certificate, e.g root,ubuntu
22
22
  attr_accessor :allowed_users
23
23
 
24
+ # Protection from accidental deletion of this item [true/false]
25
+ attr_accessor :delete_protection
26
+
24
27
  # Description of the object
25
28
  attr_accessor :description
26
29
 
@@ -69,7 +72,7 @@ module Akeyless
69
72
  # Authentication token (see `/auth` and `/configure`)
70
73
  attr_accessor :token
71
74
 
72
- # he requested Time To Live for the certificate, in seconds
75
+ # The requested Time To Live for the certificate, in seconds
73
76
  attr_accessor :ttl
74
77
 
75
78
  # The universal identity token, Required only for universal_identity authentication
@@ -80,6 +83,7 @@ module Akeyless
80
83
  {
81
84
  :'add_tag' => :'add-tag',
82
85
  :'allowed_users' => :'allowed-users',
86
+ :'delete_protection' => :'delete_protection',
83
87
  :'description' => :'description',
84
88
  :'extensions' => :'extensions',
85
89
  :'json' => :'json',
@@ -111,6 +115,7 @@ module Akeyless
111
115
  {
112
116
  :'add_tag' => :'Array<String>',
113
117
  :'allowed_users' => :'String',
118
+ :'delete_protection' => :'String',
114
119
  :'description' => :'String',
115
120
  :'extensions' => :'Hash<String, String>',
116
121
  :'json' => :'Boolean',
@@ -163,6 +168,10 @@ module Akeyless
163
168
  self.allowed_users = attributes[:'allowed_users']
164
169
  end
165
170
 
171
+ if attributes.key?(:'delete_protection')
172
+ self.delete_protection = attributes[:'delete_protection']
173
+ end
174
+
166
175
  if attributes.key?(:'description')
167
176
  self.description = attributes[:'description']
168
177
  end
@@ -284,6 +293,7 @@ module Akeyless
284
293
  self.class == o.class &&
285
294
  add_tag == o.add_tag &&
286
295
  allowed_users == o.allowed_users &&
296
+ delete_protection == o.delete_protection &&
287
297
  description == o.description &&
288
298
  extensions == o.extensions &&
289
299
  json == o.json &&
@@ -313,7 +323,7 @@ module Akeyless
313
323
  # Calculates hash code according to all attributes.
314
324
  # @return [Integer] Hash code
315
325
  def hash
316
- [add_tag, allowed_users, description, extensions, json, metadata, name, new_name, principals, rm_tag, secure_access_bastion_api, secure_access_bastion_ssh, secure_access_enable, secure_access_host, secure_access_ssh_creds_user, secure_access_use_internal_bastion, signer_key_name, token, ttl, uid_token].hash
326
+ [add_tag, allowed_users, delete_protection, description, extensions, json, metadata, name, new_name, principals, rm_tag, secure_access_bastion_api, secure_access_bastion_ssh, secure_access_enable, secure_access_host, secure_access_ssh_creds_user, secure_access_use_internal_bastion, signer_key_name, token, ttl, uid_token].hash
317
327
  end
318
328
 
319
329
  # Builds the object from hash
@@ -31,7 +31,7 @@ module Akeyless
31
31
  attr_accessor :json
32
32
 
33
33
  # The name of the key to use in the verification process
34
- attr_accessor :key_name
34
+ attr_accessor :name
35
35
 
36
36
  # The data's signature in a Base64 format.
37
37
  attr_accessor :signature
@@ -53,7 +53,7 @@ module Akeyless
53
53
  :'hashed' => :'hashed',
54
54
  :'hashing_method' => :'hashing-method',
55
55
  :'json' => :'json',
56
- :'key_name' => :'key-name',
56
+ :'name' => :'name',
57
57
  :'signature' => :'signature',
58
58
  :'token' => :'token',
59
59
  :'uid_token' => :'uid-token',
@@ -74,7 +74,7 @@ module Akeyless
74
74
  :'hashed' => :'Boolean',
75
75
  :'hashing_method' => :'String',
76
76
  :'json' => :'Boolean',
77
- :'key_name' => :'String',
77
+ :'name' => :'String',
78
78
  :'signature' => :'String',
79
79
  :'token' => :'String',
80
80
  :'uid_token' => :'String',
@@ -129,8 +129,8 @@ module Akeyless
129
129
  self.json = false
130
130
  end
131
131
 
132
- if attributes.key?(:'key_name')
133
- self.key_name = attributes[:'key_name']
132
+ if attributes.key?(:'name')
133
+ self.name = attributes[:'name']
134
134
  end
135
135
 
136
136
  if attributes.key?(:'signature')
@@ -158,8 +158,8 @@ module Akeyless
158
158
  invalid_properties.push('invalid value for "data", data cannot be nil.')
159
159
  end
160
160
 
161
- if @key_name.nil?
162
- invalid_properties.push('invalid value for "key_name", key_name cannot be nil.')
161
+ if @name.nil?
162
+ invalid_properties.push('invalid value for "name", name cannot be nil.')
163
163
  end
164
164
 
165
165
  if @signature.nil?
@@ -177,7 +177,7 @@ module Akeyless
177
177
  # @return true if the model is valid
178
178
  def valid?
179
179
  return false if @data.nil?
180
- return false if @key_name.nil?
180
+ return false if @name.nil?
181
181
  return false if @signature.nil?
182
182
  return false if @version.nil?
183
183
  true
@@ -193,7 +193,7 @@ module Akeyless
193
193
  hashed == o.hashed &&
194
194
  hashing_method == o.hashing_method &&
195
195
  json == o.json &&
196
- key_name == o.key_name &&
196
+ name == o.name &&
197
197
  signature == o.signature &&
198
198
  token == o.token &&
199
199
  uid_token == o.uid_token &&
@@ -209,7 +209,7 @@ module Akeyless
209
209
  # Calculates hash code according to all attributes.
210
210
  # @return [Integer] Hash code
211
211
  def hash
212
- [data, display_id, hashed, hashing_method, json, key_name, signature, token, uid_token, version].hash
212
+ [data, display_id, hashed, hashing_method, json, name, signature, token, uid_token, version].hash
213
213
  end
214
214
 
215
215
  # Builds the object from hash
@@ -11,5 +11,5 @@ OpenAPI Generator version: 7.0.0-SNAPSHOT
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '3.3.6'
14
+ VERSION = '3.3.7'
15
15
  end