diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index 484280fc..c123fd8a 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -69,11 +69,15 @@ docs/AuthMethodUpdateSAML.md docs/AuthMethodUpdateUniversalIdentity.md docs/AuthOutput.md docs/AwsS3LogForwardingConfig.md +docs/AwsStorage.md docs/AzureADAccessRules.md docs/AzureKeyVaultMigration.md docs/AzureLogAnalyticsForwardingConfig.md docs/AzurePayload.md +docs/AzureStorage.md docs/AzureTargetDetails.md +docs/BastionConfigReplyObj.md +docs/BastionGlobalConf.md docs/BastionListEntry.md docs/BastionsList.md docs/BatchEncryptionRequestLine.md @@ -456,6 +460,7 @@ docs/GatewayGetLdapAuthConfigOutput.md docs/GatewayGetLogForwarding.md docs/GatewayGetMigration.md docs/GatewayGetProducer.md +docs/GatewayGetRemoteAccess.md docs/GatewayGetTmpUsers.md docs/GatewayListCustomerFragments.md docs/GatewayListMigration.md @@ -554,6 +559,8 @@ docs/GatewayUpdateProducerSnowflake.md docs/GatewayUpdateProducerSnowflakeOutput.md docs/GatewayUpdateProducerVenafi.md docs/GatewayUpdateProducerVenafiOutput.md +docs/GatewayUpdateRemoteAccess.md +docs/GatewayUpdateRemoteAccessRdpRecordings.md docs/GatewayUpdateTlsCert.md docs/GatewayUpdateTlsCertOutput.md docs/GatewayUpdateTmpUsers.md @@ -600,6 +607,17 @@ docs/GodaddyTargetDetails.md docs/GoogleChronicleForwardingConfig.md docs/Group.md docs/GwClusterIdentity.md +docs/GwUpdateRemoteAccessSessionLogsAwsS3.md +docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md +docs/GwUpdateRemoteAccessSessionLogsDatadog.md +docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md +docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md +docs/GwUpdateRemoteAccessSessionLogsLogstash.md +docs/GwUpdateRemoteAccessSessionLogsLogzIo.md +docs/GwUpdateRemoteAccessSessionLogsSplunk.md +docs/GwUpdateRemoteAccessSessionLogsStdout.md +docs/GwUpdateRemoteAccessSessionLogsSumologic.md +docs/GwUpdateRemoteAccessSessionLogsSyslog.md docs/HashiMigration.md docs/HashiPayload.md docs/HashiVaultTargetDetails.md @@ -684,6 +702,7 @@ docs/MongoDBTargetDetails.md docs/MoveObjects.md docs/Name.md docs/NativeK8sTargetDetails.md +docs/NextAutoRotationEvent.md docs/NotiForwarder.md docs/OAuth2AccessRules.md docs/OAuth2CustomClaim.md @@ -695,6 +714,7 @@ docs/OidcClientInfo.md docs/OnePasswordMigration.md docs/OnePasswordPayload.md docs/PKICertificateIssueDetails.md +docs/PasswordExpirationInfo.md docs/PasswordPolicyInfo.md docs/PathRule.md docs/PingTargetDetails.md @@ -712,6 +732,8 @@ docs/RenewCertificateOutput.md docs/RequestAccess.md docs/RequestAccessOutput.md docs/RequiredActivity.md +docs/ResetAccessKey.md +docs/ResetAuthMethodAccessKeyOutput.md docs/ReverseRBAC.md docs/ReverseRBACClient.md docs/ReverseRBACOutput.md @@ -805,6 +827,8 @@ docs/SignRsaSsaPssOutput.md docs/SmInfo.md docs/SplunkLogForwardingConfig.md docs/SraInfo.md +docs/SshBastionConf.md +docs/SshBastionSessionTermination.md docs/StaticCredsAuth.md docs/StaticCredsAuthOutput.md docs/StaticSecretDetailsInfo.md @@ -1014,6 +1038,9 @@ docs/VerifyPKCS1.md docs/VerifyPKICertOutput.md docs/VerifyPKICertWithClassicKey.md docs/VerifyRsaSsaPss.md +docs/WebBastionConf.md +docs/WebBastionGuacamole.md +docs/WebBastionRdpRecord.md docs/WebHookNotiForwarderPublicDetails.md docs/WebTargetDetails.md docs/WindowsService.md @@ -1086,13 +1113,17 @@ lib/akeyless/models/auth_output.rb lib/akeyless/models/aws_payload.rb lib/akeyless/models/aws_s3_log_forwarding_config.rb lib/akeyless/models/aws_secrets_migration.rb +lib/akeyless/models/aws_storage.rb lib/akeyless/models/aws_target_details.rb lib/akeyless/models/awsiam_access_rules.rb lib/akeyless/models/azure_ad_access_rules.rb lib/akeyless/models/azure_key_vault_migration.rb lib/akeyless/models/azure_log_analytics_forwarding_config.rb lib/akeyless/models/azure_payload.rb +lib/akeyless/models/azure_storage.rb lib/akeyless/models/azure_target_details.rb +lib/akeyless/models/bastion_config_reply_obj.rb +lib/akeyless/models/bastion_global_conf.rb lib/akeyless/models/bastion_list_entry.rb lib/akeyless/models/bastions_list.rb lib/akeyless/models/batch_encryption_request_line.rb @@ -1471,6 +1502,7 @@ lib/akeyless/models/gateway_get_ldap_auth_config_output.rb lib/akeyless/models/gateway_get_log_forwarding.rb lib/akeyless/models/gateway_get_migration.rb lib/akeyless/models/gateway_get_producer.rb +lib/akeyless/models/gateway_get_remote_access.rb lib/akeyless/models/gateway_get_tmp_users.rb lib/akeyless/models/gateway_list_customer_fragments.rb lib/akeyless/models/gateway_list_migration.rb @@ -1569,6 +1601,8 @@ lib/akeyless/models/gateway_update_producer_snowflake.rb lib/akeyless/models/gateway_update_producer_snowflake_output.rb lib/akeyless/models/gateway_update_producer_venafi.rb lib/akeyless/models/gateway_update_producer_venafi_output.rb +lib/akeyless/models/gateway_update_remote_access.rb +lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb lib/akeyless/models/gateway_update_tls_cert.rb lib/akeyless/models/gateway_update_tls_cert_output.rb lib/akeyless/models/gateway_update_tmp_users.rb @@ -1619,6 +1653,17 @@ lib/akeyless/models/godaddy_target_details.rb lib/akeyless/models/google_chronicle_forwarding_config.rb lib/akeyless/models/group.rb lib/akeyless/models/gw_cluster_identity.rb +lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb +lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb +lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb +lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb +lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb +lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb +lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb +lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb +lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb +lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb +lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb lib/akeyless/models/hashi_migration.rb lib/akeyless/models/hashi_payload.rb lib/akeyless/models/hashi_vault_target_details.rb @@ -1703,6 +1748,7 @@ lib/akeyless/models/mongo_db_target_details.rb lib/akeyless/models/move_objects.rb lib/akeyless/models/name.rb lib/akeyless/models/native_k8s_target_details.rb +lib/akeyless/models/next_auto_rotation_event.rb lib/akeyless/models/noti_forwarder.rb lib/akeyless/models/o_auth2_access_rules.rb lib/akeyless/models/o_auth2_custom_claim.rb @@ -1713,6 +1759,7 @@ lib/akeyless/models/oidc_client_info.rb lib/akeyless/models/oidc_custom_claim.rb lib/akeyless/models/one_password_migration.rb lib/akeyless/models/one_password_payload.rb +lib/akeyless/models/password_expiration_info.rb lib/akeyless/models/password_policy_info.rb lib/akeyless/models/path_rule.rb lib/akeyless/models/ping_target_details.rb @@ -1731,6 +1778,8 @@ lib/akeyless/models/renew_certificate_output.rb lib/akeyless/models/request_access.rb lib/akeyless/models/request_access_output.rb lib/akeyless/models/required_activity.rb +lib/akeyless/models/reset_access_key.rb +lib/akeyless/models/reset_auth_method_access_key_output.rb lib/akeyless/models/reverse_rbac.rb lib/akeyless/models/reverse_rbac_client.rb lib/akeyless/models/reverse_rbac_output.rb @@ -1822,6 +1871,8 @@ lib/akeyless/models/sign_rsa_ssa_pss_output.rb lib/akeyless/models/sm_info.rb lib/akeyless/models/splunk_log_forwarding_config.rb lib/akeyless/models/sra_info.rb +lib/akeyless/models/ssh_bastion_conf.rb +lib/akeyless/models/ssh_bastion_session_termination.rb lib/akeyless/models/ssh_certificate_issue_details.rb lib/akeyless/models/ssh_target_details.rb lib/akeyless/models/static_creds_auth.rb @@ -2032,6 +2083,9 @@ lib/akeyless/models/verify_pkcs1.rb lib/akeyless/models/verify_pki_cert_output.rb lib/akeyless/models/verify_pki_cert_with_classic_key.rb lib/akeyless/models/verify_rsa_ssa_pss.rb +lib/akeyless/models/web_bastion_conf.rb +lib/akeyless/models/web_bastion_guacamole.rb +lib/akeyless/models/web_bastion_rdp_record.rb lib/akeyless/models/web_hook_noti_forwarder_public_details.rb lib/akeyless/models/web_target_details.rb lib/akeyless/models/windows_service.rb @@ -2039,11 +2093,31 @@ lib/akeyless/models/windows_service_attributes.rb lib/akeyless/models/windows_target_details.rb lib/akeyless/models/zero_ssl_target_details.rb lib/akeyless/version.rb -spec/models/alias_details_output_spec.rb -spec/models/alias_details_spec.rb -spec/models/batch_tokenization_request_line_spec.rb -spec/models/batch_tokenization_response_line_spec.rb -spec/models/sectigo_target_details_spec.rb -spec/models/target_create_sectigo_spec.rb -spec/models/target_update_sectigo_spec.rb +spec/models/aws_storage_spec.rb +spec/models/azure_storage_spec.rb +spec/models/bastion_config_reply_obj_spec.rb +spec/models/bastion_global_conf_spec.rb +spec/models/gateway_get_remote_access_spec.rb +spec/models/gateway_update_remote_access_rdp_recordings_spec.rb +spec/models/gateway_update_remote_access_spec.rb +spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb +spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb +spec/models/gw_update_remote_access_session_logs_datadog_spec.rb +spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb +spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb +spec/models/gw_update_remote_access_session_logs_logstash_spec.rb +spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb +spec/models/gw_update_remote_access_session_logs_splunk_spec.rb +spec/models/gw_update_remote_access_session_logs_stdout_spec.rb +spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb +spec/models/gw_update_remote_access_session_logs_syslog_spec.rb +spec/models/next_auto_rotation_event_spec.rb +spec/models/password_expiration_info_spec.rb +spec/models/reset_access_key_spec.rb +spec/models/reset_auth_method_access_key_output_spec.rb +spec/models/ssh_bastion_conf_spec.rb +spec/models/ssh_bastion_session_termination_spec.rb +spec/models/web_bastion_conf_spec.rb +spec/models/web_bastion_guacamole_spec.rb +spec/models/web_bastion_rdp_record_spec.rb spec/spec_helper.rb diff --git a/.travis.yml b/.travis.yml index b015824c..72dcb060 100644 --- a/.travis.yml +++ b/.travis.yml @@ -8,4 +8,4 @@ script: - bundle install --path vendor/bundle - bundle exec rspec - gem build akeyless.gemspec - - gem install ./akeyless-4.2.3.gem + - gem install ./akeyless-4.2.4.gem diff --git a/README.md b/README.md index 0711765a..c96e293e 100644 --- a/README.md +++ b/README.md @@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API. This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: 2.0 -- Package version: 4.2.3 +- Package version: 4.2.4 - Generator version: 7.9.0-SNAPSHOT - Build package: org.openapitools.codegen.languages.RubyClientCodegen For more information, please visit [http://akeyless.io](http://akeyless.io) @@ -60,7 +60,7 @@ All URIs are relative to *https://api.akeyless.io* Class | Method | HTTP request | Description ------------ | ------------- | ------------- | ------------- -*Akeyless::V2Api* | [**alias_details**](docs/V2Api.md#alias_details) | **GET** /alias-details | +*Akeyless::V2Api* | [**alias_details**](docs/V2Api.md#alias_details) | **POST** /alias-details | *Akeyless::V2Api* | [**assoc_role_auth_method**](docs/V2Api.md#assoc_role_auth_method) | **POST** /assoc-role-am | *Akeyless::V2Api* | [**assoc_target_item**](docs/V2Api.md#assoc_target_item) | **POST** /assoc-target-item | *Akeyless::V2Api* | [**auth**](docs/V2Api.md#auth) | **POST** /auth | @@ -302,6 +302,7 @@ Class | Method | HTTP request | Description *Akeyless::V2Api* | [**gateway_get_log_forwarding**](docs/V2Api.md#gateway_get_log_forwarding) | **POST** /gateway-get-log-forwarding | *Akeyless::V2Api* | [**gateway_get_migration**](docs/V2Api.md#gateway_get_migration) | **POST** /gateway-get-migration | *Akeyless::V2Api* | [**gateway_get_producer**](docs/V2Api.md#gateway_get_producer) | **POST** /gateway-get-producer | +*Akeyless::V2Api* | [**gateway_get_remote_access**](docs/V2Api.md#gateway_get_remote_access) | **POST** /gateway-get-remote-access | *Akeyless::V2Api* | [**gateway_get_tmp_users**](docs/V2Api.md#gateway_get_tmp_users) | **POST** /gateway-get-producer-tmp-creds | *Akeyless::V2Api* | [**gateway_list_customer_fragments**](docs/V2Api.md#gateway_list_customer_fragments) | **POST** /gateway-list-customer-fragments | *Akeyless::V2Api* | [**gateway_list_migration**](docs/V2Api.md#gateway_list_migration) | **POST** /gateway-list-migration | @@ -357,6 +358,8 @@ Class | Method | HTTP request | Description *Akeyless::V2Api* | [**gateway_update_producer_redshift**](docs/V2Api.md#gateway_update_producer_redshift) | **POST** /gateway-update-producer-redshift | *Akeyless::V2Api* | [**gateway_update_producer_snowflake**](docs/V2Api.md#gateway_update_producer_snowflake) | **POST** /gateway-update-producer-snowflake | *Akeyless::V2Api* | [**gateway_update_producer_venafi**](docs/V2Api.md#gateway_update_producer_venafi) | **POST** /gateway-update-producer-certificate-automation | +*Akeyless::V2Api* | [**gateway_update_remote_access**](docs/V2Api.md#gateway_update_remote_access) | **POST** /gateway-update-remote-access | +*Akeyless::V2Api* | [**gateway_update_remote_access_rdp_recordings**](docs/V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording | *Akeyless::V2Api* | [**gateway_update_tls_cert**](docs/V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert | *Akeyless::V2Api* | [**gateway_update_tmp_users**](docs/V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds | *Akeyless::V2Api* | [**generate_csr**](docs/V2Api.md#generate_csr) | **POST** /generate-csr | @@ -379,6 +382,17 @@ Class | Method | HTTP request | Description *Akeyless::V2Api* | [**get_tags**](docs/V2Api.md#get_tags) | **POST** /get-tags | *Akeyless::V2Api* | [**get_target**](docs/V2Api.md#get_target) | **POST** /get-target | *Akeyless::V2Api* | [**get_target_details**](docs/V2Api.md#get_target_details) | **POST** /get-target-details | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_aws_s3**](docs/V2Api.md#gw_update_remote_access_session_logs_aws_s3) | **POST** /gateway-update-remote-access-session-forwarding-aws-s3 | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_azure_analytics**](docs/V2Api.md#gw_update_remote_access_session_logs_azure_analytics) | **POST** /gateway-update-remote-access-session-forwarding-azure-analytics | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_datadog**](docs/V2Api.md#gw_update_remote_access_session_logs_datadog) | **POST** /gateway-update-remote-access-session-forwarding-datadog | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_elasticsearch**](docs/V2Api.md#gw_update_remote_access_session_logs_elasticsearch) | **POST** /gateway-update-remote-access-session-forwarding-elasticsearch | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_google_chronicle**](docs/V2Api.md#gw_update_remote_access_session_logs_google_chronicle) | **POST** /gateway-update-remote-access-session-forwarding-google-chronicle | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_logstash**](docs/V2Api.md#gw_update_remote_access_session_logs_logstash) | **POST** /gateway-update-remote-access-session-forwarding-logstash | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_logz_io**](docs/V2Api.md#gw_update_remote_access_session_logs_logz_io) | **POST** /gateway-update-remote-access-session-forwarding-logz-io | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_splunk**](docs/V2Api.md#gw_update_remote_access_session_logs_splunk) | **POST** /gateway-update-remote-access-session-forwarding-splunk | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_stdout**](docs/V2Api.md#gw_update_remote_access_session_logs_stdout) | **POST** /gateway-update-remote-access-session-forwarding-stdout | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_sumologic**](docs/V2Api.md#gw_update_remote_access_session_logs_sumologic) | **POST** /gateway-update-remote-access-session-forwarding-sumologic | +*Akeyless::V2Api* | [**gw_update_remote_access_session_logs_syslog**](docs/V2Api.md#gw_update_remote_access_session_logs_syslog) | **POST** /gateway-update-remote-access-session-forwarding-syslog | *Akeyless::V2Api* | [**hmac**](docs/V2Api.md#hmac) | **POST** /hmac | *Akeyless::V2Api* | [**import_passwords**](docs/V2Api.md#import_passwords) | **POST** /import-passwords | *Akeyless::V2Api* | [**kmip_client_delete_rule**](docs/V2Api.md#kmip_client_delete_rule) | **POST** /kmip-client-delete-rule | @@ -664,11 +678,15 @@ Class | Method | HTTP request | Description - [Akeyless::AuthMethodUpdateUniversalIdentity](docs/AuthMethodUpdateUniversalIdentity.md) - [Akeyless::AuthOutput](docs/AuthOutput.md) - [Akeyless::AwsS3LogForwardingConfig](docs/AwsS3LogForwardingConfig.md) + - [Akeyless::AwsStorage](docs/AwsStorage.md) - [Akeyless::AzureADAccessRules](docs/AzureADAccessRules.md) - [Akeyless::AzureKeyVaultMigration](docs/AzureKeyVaultMigration.md) - [Akeyless::AzureLogAnalyticsForwardingConfig](docs/AzureLogAnalyticsForwardingConfig.md) - [Akeyless::AzurePayload](docs/AzurePayload.md) + - [Akeyless::AzureStorage](docs/AzureStorage.md) - [Akeyless::AzureTargetDetails](docs/AzureTargetDetails.md) + - [Akeyless::BastionConfigReplyObj](docs/BastionConfigReplyObj.md) + - [Akeyless::BastionGlobalConf](docs/BastionGlobalConf.md) - [Akeyless::BastionListEntry](docs/BastionListEntry.md) - [Akeyless::BastionsList](docs/BastionsList.md) - [Akeyless::BatchEncryptionRequestLine](docs/BatchEncryptionRequestLine.md) @@ -1051,6 +1069,7 @@ Class | Method | HTTP request | Description - [Akeyless::GatewayGetLogForwarding](docs/GatewayGetLogForwarding.md) - [Akeyless::GatewayGetMigration](docs/GatewayGetMigration.md) - [Akeyless::GatewayGetProducer](docs/GatewayGetProducer.md) + - [Akeyless::GatewayGetRemoteAccess](docs/GatewayGetRemoteAccess.md) - [Akeyless::GatewayGetTmpUsers](docs/GatewayGetTmpUsers.md) - [Akeyless::GatewayListCustomerFragments](docs/GatewayListCustomerFragments.md) - [Akeyless::GatewayListMigration](docs/GatewayListMigration.md) @@ -1149,6 +1168,8 @@ Class | Method | HTTP request | Description - [Akeyless::GatewayUpdateProducerSnowflakeOutput](docs/GatewayUpdateProducerSnowflakeOutput.md) - [Akeyless::GatewayUpdateProducerVenafi](docs/GatewayUpdateProducerVenafi.md) - [Akeyless::GatewayUpdateProducerVenafiOutput](docs/GatewayUpdateProducerVenafiOutput.md) + - [Akeyless::GatewayUpdateRemoteAccess](docs/GatewayUpdateRemoteAccess.md) + - [Akeyless::GatewayUpdateRemoteAccessRdpRecordings](docs/GatewayUpdateRemoteAccessRdpRecordings.md) - [Akeyless::GatewayUpdateTlsCert](docs/GatewayUpdateTlsCert.md) - [Akeyless::GatewayUpdateTlsCertOutput](docs/GatewayUpdateTlsCertOutput.md) - [Akeyless::GatewayUpdateTmpUsers](docs/GatewayUpdateTmpUsers.md) @@ -1195,6 +1216,17 @@ Class | Method | HTTP request | Description - [Akeyless::GoogleChronicleForwardingConfig](docs/GoogleChronicleForwardingConfig.md) - [Akeyless::Group](docs/Group.md) - [Akeyless::GwClusterIdentity](docs/GwClusterIdentity.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3](docs/GwUpdateRemoteAccessSessionLogsAwsS3.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics](docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsDatadog](docs/GwUpdateRemoteAccessSessionLogsDatadog.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch](docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle](docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsLogstash](docs/GwUpdateRemoteAccessSessionLogsLogstash.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo](docs/GwUpdateRemoteAccessSessionLogsLogzIo.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsSplunk](docs/GwUpdateRemoteAccessSessionLogsSplunk.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsStdout](docs/GwUpdateRemoteAccessSessionLogsStdout.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsSumologic](docs/GwUpdateRemoteAccessSessionLogsSumologic.md) + - [Akeyless::GwUpdateRemoteAccessSessionLogsSyslog](docs/GwUpdateRemoteAccessSessionLogsSyslog.md) - [Akeyless::HashiMigration](docs/HashiMigration.md) - [Akeyless::HashiPayload](docs/HashiPayload.md) - [Akeyless::HashiVaultTargetDetails](docs/HashiVaultTargetDetails.md) @@ -1279,6 +1311,7 @@ Class | Method | HTTP request | Description - [Akeyless::MoveObjects](docs/MoveObjects.md) - [Akeyless::Name](docs/Name.md) - [Akeyless::NativeK8sTargetDetails](docs/NativeK8sTargetDetails.md) + - [Akeyless::NextAutoRotationEvent](docs/NextAutoRotationEvent.md) - [Akeyless::NotiForwarder](docs/NotiForwarder.md) - [Akeyless::OAuth2AccessRules](docs/OAuth2AccessRules.md) - [Akeyless::OAuth2CustomClaim](docs/OAuth2CustomClaim.md) @@ -1290,6 +1323,7 @@ Class | Method | HTTP request | Description - [Akeyless::OnePasswordMigration](docs/OnePasswordMigration.md) - [Akeyless::OnePasswordPayload](docs/OnePasswordPayload.md) - [Akeyless::PKICertificateIssueDetails](docs/PKICertificateIssueDetails.md) + - [Akeyless::PasswordExpirationInfo](docs/PasswordExpirationInfo.md) - [Akeyless::PasswordPolicyInfo](docs/PasswordPolicyInfo.md) - [Akeyless::PathRule](docs/PathRule.md) - [Akeyless::PingTargetDetails](docs/PingTargetDetails.md) @@ -1307,6 +1341,8 @@ Class | Method | HTTP request | Description - [Akeyless::RequestAccess](docs/RequestAccess.md) - [Akeyless::RequestAccessOutput](docs/RequestAccessOutput.md) - [Akeyless::RequiredActivity](docs/RequiredActivity.md) + - [Akeyless::ResetAccessKey](docs/ResetAccessKey.md) + - [Akeyless::ResetAuthMethodAccessKeyOutput](docs/ResetAuthMethodAccessKeyOutput.md) - [Akeyless::ReverseRBAC](docs/ReverseRBAC.md) - [Akeyless::ReverseRBACClient](docs/ReverseRBACClient.md) - [Akeyless::ReverseRBACOutput](docs/ReverseRBACOutput.md) @@ -1400,6 +1436,8 @@ Class | Method | HTTP request | Description - [Akeyless::SmInfo](docs/SmInfo.md) - [Akeyless::SplunkLogForwardingConfig](docs/SplunkLogForwardingConfig.md) - [Akeyless::SraInfo](docs/SraInfo.md) + - [Akeyless::SshBastionConf](docs/SshBastionConf.md) + - [Akeyless::SshBastionSessionTermination](docs/SshBastionSessionTermination.md) - [Akeyless::StaticCredsAuth](docs/StaticCredsAuth.md) - [Akeyless::StaticCredsAuthOutput](docs/StaticCredsAuthOutput.md) - [Akeyless::StaticSecretDetailsInfo](docs/StaticSecretDetailsInfo.md) @@ -1608,6 +1646,9 @@ Class | Method | HTTP request | Description - [Akeyless::VerifyPKICertOutput](docs/VerifyPKICertOutput.md) - [Akeyless::VerifyPKICertWithClassicKey](docs/VerifyPKICertWithClassicKey.md) - [Akeyless::VerifyRsaSsaPss](docs/VerifyRsaSsaPss.md) + - [Akeyless::WebBastionConf](docs/WebBastionConf.md) + - [Akeyless::WebBastionGuacamole](docs/WebBastionGuacamole.md) + - [Akeyless::WebBastionRdpRecord](docs/WebBastionRdpRecord.md) - [Akeyless::WebHookNotiForwarderPublicDetails](docs/WebHookNotiForwarderPublicDetails.md) - [Akeyless::WebTargetDetails](docs/WebTargetDetails.md) - [Akeyless::WindowsService](docs/WindowsService.md) diff --git a/docs/AccountGeneralSettings.md b/docs/AccountGeneralSettings.md index 7ea08575..59e2fab4 100644 --- a/docs/AccountGeneralSettings.md +++ b/docs/AccountGeneralSettings.md @@ -15,6 +15,7 @@ | **invalid_characters** | **String** | InvalidCharacters is the invalid characters for items/targets/roles/auths/notifier_forwarder naming convention | [optional] | | **item_usage_event** | [**UsageEventSetting**](UsageEventSetting.md) | | [optional] | | **lock_default_key** | **Boolean** | LockDefaultKey determines whether the configured default key can be updated by end-users on a per-request basis true - all requests use the configured default key false - every request can determine its protection key (default) nil - change nothing (every request can determine its protection key (default)) This parameter is only relevant if AccountDefaultKeyItemID is not empty | [optional] | +| **password_expiration_info** | [**PasswordExpirationInfo**](PasswordExpirationInfo.md) | | [optional] | | **password_policy** | [**PasswordPolicyInfo**](PasswordPolicyInfo.md) | | [optional] | | **protect_items_by_default** | **Boolean** | | [optional] | | **rotation_secret_max_interval** | [**RotationSecretMaxInterval**](RotationSecretMaxInterval.md) | | [optional] | @@ -37,6 +38,7 @@ instance = Akeyless::AccountGeneralSettings.new( invalid_characters: null, item_usage_event: null, lock_default_key: null, + password_expiration_info: null, password_policy: null, protect_items_by_default: null, rotation_secret_max_interval: null, diff --git a/docs/AwsStorage.md b/docs/AwsStorage.md new file mode 100644 index 00000000..542fee42 --- /dev/null +++ b/docs/AwsStorage.md @@ -0,0 +1,28 @@ +# Akeyless::AwsStorage + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **access_key_id** | **String** | creds | [optional] | +| **access_key_secret** | **String** | | [optional] | +| **auth_type** | **String** | | [optional] | +| **bucket** | **String** | | [optional] | +| **prefix** | **String** | | [optional] | +| **region** | **String** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::AwsStorage.new( + access_key_id: null, + access_key_secret: null, + auth_type: null, + bucket: null, + prefix: null, + region: null +) +``` + diff --git a/docs/AzureStorage.md b/docs/AzureStorage.md new file mode 100644 index 00000000..27c49377 --- /dev/null +++ b/docs/AzureStorage.md @@ -0,0 +1,28 @@ +# Akeyless::AzureStorage + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **auth_type** | **String** | | [optional] | +| **client_id** | **String** | | [optional] | +| **client_secret** | **String** | | [optional] | +| **storage_account** | **String** | | [optional] | +| **storage_container_name** | **String** | | [optional] | +| **tenant_id** | **String** | creds | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::AzureStorage.new( + auth_type: null, + client_id: null, + client_secret: null, + storage_account: null, + storage_container_name: null, + tenant_id: null +) +``` + diff --git a/docs/BastionConfigReplyObj.md b/docs/BastionConfigReplyObj.md new file mode 100644 index 00000000..2e97f29c --- /dev/null +++ b/docs/BastionConfigReplyObj.md @@ -0,0 +1,28 @@ +# Akeyless::BastionConfigReplyObj + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **api_gateway_url** | **String** | | [optional] | +| **cluster_id** | **String** | | [optional] | +| **gator_cluster_id** | **Integer** | | [optional] | +| **global** | [**BastionGlobalConf**](BastionGlobalConf.md) | | [optional] | +| **ssh_bastion** | [**SshBastionConf**](SshBastionConf.md) | | [optional] | +| **web_bastion** | [**WebBastionConf**](WebBastionConf.md) | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::BastionConfigReplyObj.new( + api_gateway_url: null, + cluster_id: null, + gator_cluster_id: null, + global: null, + ssh_bastion: null, + web_bastion: null +) +``` + diff --git a/docs/BastionGlobalConf.md b/docs/BastionGlobalConf.md new file mode 100644 index 00000000..c7a19a57 --- /dev/null +++ b/docs/BastionGlobalConf.md @@ -0,0 +1,24 @@ +# Akeyless::BastionGlobalConf + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **allowed_bastion_urls** | **Array<String>** | | [optional] | +| **legacy_signing_alg** | **Boolean** | | [optional] | +| **rdp_username_sub_claim** | **String** | | [optional] | +| **ssh_username_sub_claim** | **String** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::BastionGlobalConf.new( + allowed_bastion_urls: null, + legacy_signing_alg: null, + rdp_username_sub_claim: null, + ssh_username_sub_claim: null +) +``` + diff --git a/docs/Configure.md b/docs/Configure.md index 54b7bf9b..9365dd6c 100644 --- a/docs/Configure.md +++ b/docs/Configure.md @@ -12,10 +12,14 @@ | **admin_password** | **String** | Password (relevant only for access-type=password) | [optional] | | **azure_ad_object_id** | **String** | Azure Active Directory ObjectId (relevant only for access-type=azure_ad) | [optional] | | **cert_data** | **String** | Certificate data encoded in base64. Used if file was not provided. (relevant only for access-type=cert in Curl Context) | [optional] | +| **cert_issuer_name** | **String** | Certificate Issuer Name | [optional] | +| **cert_username** | **String** | The username to sign in the SSH certificate (use a comma-separated list for more than one username) | [optional] | +| **default_location_prefix** | **String** | Default path prefix for name of items, targets and auth methods | [optional] | | **gcp_audience** | **String** | GCP JWT audience | [optional][default to 'akeyless.io'] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **k8s_auth_config_name** | **String** | The K8S Auth config name (relevant only for access-type=k8s) | [optional] | | **key_data** | **String** | Private key data encoded in base64. Used if file was not provided.(relevant only for access-type=cert in Curl Context) | [optional] | +| **legacy_signing_alg_name** | **Boolean** | Set this option to output legacy ('ssh-rsa-cert-v01@openssh.com') signing algorithm name in the certificate. | [optional] | | **oci_auth_type** | **String** | The type of the OCI configuration to use [instance/apikey/resource] (relevant only for access-type=oci) | [optional][default to 'apikey'] | | **oci_group_ocid** | **Array<String>** | A list of Oracle Cloud IDs groups (relevant only for access-type=oci) | [optional] | @@ -33,10 +37,14 @@ instance = Akeyless::Configure.new( admin_password: null, azure_ad_object_id: null, cert_data: null, + cert_issuer_name: null, + cert_username: null, + default_location_prefix: null, gcp_audience: null, json: null, k8s_auth_config_name: null, key_data: null, + legacy_signing_alg_name: null, oci_auth_type: null, oci_group_ocid: null ) diff --git a/docs/Connect.md b/docs/Connect.md index f6007e1f..007b2784 100644 --- a/docs/Connect.md +++ b/docs/Connect.md @@ -4,7 +4,6 @@ | Name | Type | Description | Notes | | ---- | ---- | ----------- | ----- | -| **bastion_gateway_url** | **String** | todo - enable when gw-sra unification is done The Gateway URL (configuration management) address, e.g. http://localhost:8000 | [optional] | | **helper** | **Object** | | [optional] | | **rc_file_override** | **String** | used to override .akeyless-connect.rc in tests | [optional] | | **bastion_ctrl_path** | **String** | The Bastion API path | [optional] | @@ -12,6 +11,7 @@ | **bastion_ctrl_proto** | **String** | The Bastion API protocol | [optional][default to 'http'] | | **bastion_ctrl_subdomain** | **String** | The Bastion API prefix | [optional] | | **cert_issuer_name** | **String** | The Akeyless certificate issuer name | [optional] | +| **gateway_url** | **String** | The Gateway URL (configuration management) address, e.g. http://localhost:8000 | [optional] | | **identity_file** | **String** | The file from which the identity (private key) for public key authentication is read | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **justification** | **String** | | [optional] | @@ -31,7 +31,6 @@ require 'akeyless' instance = Akeyless::Connect.new( - bastion_gateway_url: null, helper: null, rc_file_override: null, bastion_ctrl_path: null, @@ -39,6 +38,7 @@ instance = Akeyless::Connect.new( bastion_ctrl_proto: null, bastion_ctrl_subdomain: null, cert_issuer_name: null, + gateway_url: null, identity_file: null, json: null, justification: null, diff --git a/docs/CreateClassicKey.md b/docs/CreateClassicKey.md index 4a74f954..0635a9ef 100644 --- a/docs/CreateClassicKey.md +++ b/docs/CreateClassicKey.md @@ -5,6 +5,7 @@ | Name | Type | Description | Notes | | ---- | ---- | ----------- | ----- | | **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] | | +| **auto_rotate** | **String** | Whether to automatically rotate every rotation_interval days, or disable existing automatic rotation [true/false] | [optional] | | **cert_file_data** | **String** | Certificate in a PEM format. | [optional] | | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] | | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] | @@ -17,6 +18,7 @@ | **conf_file_data** | **String** | The csr config data in base64 encoding | [optional] | | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] | | **description** | **String** | Description of the object | [optional] | +| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] | | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] | | **gpg_alg** | **String** | gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519] | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | @@ -24,6 +26,8 @@ | **metadata** | **String** | Deprecated - use description | [optional] | | **name** | **String** | ClassicKey name | | | **protection_key_name** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | +| **rotation_interval** | **String** | The number of days to wait between every automatic rotation (1-365) | [optional] | | **tags** | **Array<String>** | Add tags attached to this object | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | @@ -35,6 +39,7 @@ require 'akeyless' instance = Akeyless::CreateClassicKey.new( alg: null, + auto_rotate: null, cert_file_data: null, certificate_common_name: null, certificate_country: null, @@ -47,6 +52,7 @@ instance = Akeyless::CreateClassicKey.new( conf_file_data: null, delete_protection: null, description: null, + expiration_event_in: null, generate_self_signed_certificate: null, gpg_alg: null, json: null, @@ -54,6 +60,8 @@ instance = Akeyless::CreateClassicKey.new( metadata: null, name: null, protection_key_name: null, + rotation_event_in: null, + rotation_interval: null, tags: null, token: null, uid_token: null diff --git a/docs/CreateDFCKey.md b/docs/CreateDFCKey.md index c851fc00..3748a652 100644 --- a/docs/CreateDFCKey.md +++ b/docs/CreateDFCKey.md @@ -5,6 +5,7 @@ | Name | Type | Description | Notes | | ---- | ---- | ----------- | ----- | | **alg** | **String** | DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | | +| **auto_rotate** | **String** | Whether to automatically rotate every rotation_interval days, or disable existing automatic rotation [true/false] | [optional] | | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] | | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] | | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] | @@ -17,10 +18,13 @@ | **customer_frg_id** | **String** | The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment) | [optional] | | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] | | **description** | **String** | Description of the object | [optional] | +| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] | | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **metadata** | **String** | Deprecated - use description | [optional] | | **name** | **String** | DFCKey name | | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | +| **rotation_interval** | **String** | The number of days to wait between every automatic rotation (7-365) | [optional] | | **split_level** | **Integer** | The number of fragments that the item will be split into (not includes customer fragment) | [optional][default to 3] | | **tag** | **Array<String>** | List of the tags attached to this DFC key | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | @@ -33,6 +37,7 @@ require 'akeyless' instance = Akeyless::CreateDFCKey.new( alg: null, + auto_rotate: null, certificate_common_name: null, certificate_country: null, certificate_digest_algo: null, @@ -45,10 +50,13 @@ instance = Akeyless::CreateDFCKey.new( customer_frg_id: null, delete_protection: null, description: null, + expiration_event_in: null, generate_self_signed_certificate: null, json: null, metadata: null, name: null, + rotation_event_in: null, + rotation_interval: null, split_level: null, tag: null, token: null, diff --git a/docs/DynamicSecretUpdateArtifactory.md b/docs/DynamicSecretUpdateArtifactory.md index 03f2debb..36630f4c 100644 --- a/docs/DynamicSecretUpdateArtifactory.md +++ b/docs/DynamicSecretUpdateArtifactory.md @@ -13,7 +13,7 @@ | **description** | **String** | Description of the object | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **tags** | **Array<String>** | Add tags attached to this object | [optional] | | **target_name** | **String** | Target name | [optional] | diff --git a/docs/DynamicSecretUpdateAws.md b/docs/DynamicSecretUpdateAws.md index 4dbdfe14..024c0119 100644 --- a/docs/DynamicSecretUpdateAws.md +++ b/docs/DynamicSecretUpdateAws.md @@ -18,7 +18,7 @@ | **enable_admin_rotation** | **Boolean** | Automatic admin credentials rotation | [optional][default to false] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **region** | **String** | Region | [optional][default to 'us-east-2'] | diff --git a/docs/DynamicSecretUpdateAzure.md b/docs/DynamicSecretUpdateAzure.md index 4d2beffa..e2f151d0 100644 --- a/docs/DynamicSecretUpdateAzure.md +++ b/docs/DynamicSecretUpdateAzure.md @@ -14,7 +14,7 @@ | **fixed_user_only** | **Boolean** | Fixed user | [optional][default to false] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic secret encryption key | [optional] | | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] | diff --git a/docs/DynamicSecretUpdateCassandra.md b/docs/DynamicSecretUpdateCassandra.md index 9403ed3a..6aecc660 100644 --- a/docs/DynamicSecretUpdateCassandra.md +++ b/docs/DynamicSecretUpdateCassandra.md @@ -13,7 +13,7 @@ | **description** | **String** | Description of the object | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **ssl** | **Boolean** | Enable/Disable SSL [true/false] | [optional][default to false] | diff --git a/docs/DynamicSecretUpdateChef.md b/docs/DynamicSecretUpdateChef.md index d94bfc07..29b327b8 100644 --- a/docs/DynamicSecretUpdateChef.md +++ b/docs/DynamicSecretUpdateChef.md @@ -12,7 +12,7 @@ | **description** | **String** | Description of the object | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **skip_ssl** | **Boolean** | Skip SSL | [optional][default to true] | diff --git a/docs/DynamicSecretUpdateCustom.md b/docs/DynamicSecretUpdateCustom.md index 72ed8aba..a8811836 100644 --- a/docs/DynamicSecretUpdateCustom.md +++ b/docs/DynamicSecretUpdateCustom.md @@ -11,7 +11,7 @@ | **enable_admin_rotation** | **Boolean** | Should admin credentials be rotated | [optional][default to false] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **payload** | **String** | Secret payload to be sent with each create/revoke webhook request | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **revoke_sync_url** | **String** | URL of an endpoint that implements /sync/revoke method, for example https://webhook.example.com/sync/revoke | | diff --git a/docs/DynamicSecretUpdateDockerhub.md b/docs/DynamicSecretUpdateDockerhub.md index 25a80e35..ac0bd0bb 100644 --- a/docs/DynamicSecretUpdateDockerhub.md +++ b/docs/DynamicSecretUpdateDockerhub.md @@ -11,7 +11,7 @@ | **dockerhub_username** | **String** | DockerhubUsername is the name of the user in dockerhub | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **tags** | **Array<String>** | Add tags attached to this object | [optional] | | **target_name** | **String** | Target name | [optional] | diff --git a/docs/DynamicSecretUpdateEks.md b/docs/DynamicSecretUpdateEks.md index af749704..dfbd0432 100644 --- a/docs/DynamicSecretUpdateEks.md +++ b/docs/DynamicSecretUpdateEks.md @@ -15,7 +15,7 @@ | **eks_secret_access_key** | **String** | Secret Access Key | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_allow_port_forwading** | **Boolean** | Enable Port forwarding while using CLI access | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateGcp.md b/docs/DynamicSecretUpdateGcp.md index 99107a9e..9c13b6c3 100644 --- a/docs/DynamicSecretUpdateGcp.md +++ b/docs/DynamicSecretUpdateGcp.md @@ -13,7 +13,7 @@ | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **role_binding** | **String** | Role binding definitions in json format | [optional] | | **service_account_type** | **String** | The type of the gcp dynamic secret. Options[fixed, dynamic] | [default to 'fixed'] | diff --git a/docs/DynamicSecretUpdateGithub.md b/docs/DynamicSecretUpdateGithub.md index e87a11d7..28a2161c 100644 --- a/docs/DynamicSecretUpdateGithub.md +++ b/docs/DynamicSecretUpdateGithub.md @@ -14,7 +14,7 @@ | **installation_repository** | **String** | Optional, mutually exclusive with installation id, GitHub repository '<owner>/<repo-name>' | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **tags** | **Array<String>** | Add tags attached to this object | [optional] | | **target_name** | **String** | Target name | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | diff --git a/docs/DynamicSecretUpdateGitlab.md b/docs/DynamicSecretUpdateGitlab.md index c64c5c01..4c99af8a 100644 --- a/docs/DynamicSecretUpdateGitlab.md +++ b/docs/DynamicSecretUpdateGitlab.md @@ -16,7 +16,7 @@ | **installation_organization** | **String** | Gitlab project name, required for access-type=project | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **tags** | **Array<String>** | Add tags attached to this object | [optional] | | **target_name** | **String** | Target name | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | diff --git a/docs/DynamicSecretUpdateGke.md b/docs/DynamicSecretUpdateGke.md index 413fc565..d7beb53f 100644 --- a/docs/DynamicSecretUpdateGke.md +++ b/docs/DynamicSecretUpdateGke.md @@ -13,7 +13,7 @@ | **gke_service_account_email** | **String** | GKE service account email | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_allow_port_forwading** | **Boolean** | Enable Port forwarding while using CLI access | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateGoogleWorkspace.md b/docs/DynamicSecretUpdateGoogleWorkspace.md index 21074410..b234a18e 100644 --- a/docs/DynamicSecretUpdateGoogleWorkspace.md +++ b/docs/DynamicSecretUpdateGoogleWorkspace.md @@ -13,7 +13,7 @@ | **group_role** | **String** | | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **role_name** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] | | **role_scope** | **String** | | [optional] | diff --git a/docs/DynamicSecretUpdateHanaDb.md b/docs/DynamicSecretUpdateHanaDb.md index d72601f5..14b8d89a 100644 --- a/docs/DynamicSecretUpdateHanaDb.md +++ b/docs/DynamicSecretUpdateHanaDb.md @@ -15,7 +15,7 @@ | **hanadb_username** | **String** | HanaDb Username | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateK8s.md b/docs/DynamicSecretUpdateK8s.md index d08f8e1d..cce889a2 100644 --- a/docs/DynamicSecretUpdateK8s.md +++ b/docs/DynamicSecretUpdateK8s.md @@ -19,7 +19,7 @@ | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] | | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_allow_port_forwading** | **Boolean** | Enable Port forwarding while using CLI access | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateLdap.md b/docs/DynamicSecretUpdateLdap.md index b55e1d9a..0970f9b1 100644 --- a/docs/DynamicSecretUpdateLdap.md +++ b/docs/DynamicSecretUpdateLdap.md @@ -16,7 +16,7 @@ | **ldap_ca_cert** | **String** | CA Certificate File Content | [optional] | | **ldap_url** | **String** | LDAP Server URL | [optional] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] | diff --git a/docs/DynamicSecretUpdateMongoDb.md b/docs/DynamicSecretUpdateMongoDb.md index 92519167..60e8fed5 100644 --- a/docs/DynamicSecretUpdateMongoDb.md +++ b/docs/DynamicSecretUpdateMongoDb.md @@ -20,7 +20,7 @@ | **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] | | **mongodb_username** | **String** | MongoDB server username | [optional] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Encrypt producer with following key | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateMsSql.md b/docs/DynamicSecretUpdateMsSql.md index b0e7a090..94cfb071 100644 --- a/docs/DynamicSecretUpdateMsSql.md +++ b/docs/DynamicSecretUpdateMsSql.md @@ -15,7 +15,7 @@ | **mssql_revocation_statements** | **String** | MSSQL Revocation statements | [optional] | | **mssql_username** | **String** | MSSQL Username | [optional] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateMySql.md b/docs/DynamicSecretUpdateMySql.md index 55890ffb..050c52c2 100644 --- a/docs/DynamicSecretUpdateMySql.md +++ b/docs/DynamicSecretUpdateMySql.md @@ -17,7 +17,7 @@ | **mysql_screation_statements** | **String** | MySQL Creation statements | [optional] | | **mysql_username** | **String** | MySQL Username | [optional] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | diff --git a/docs/DynamicSecretUpdateOracleDb.md b/docs/DynamicSecretUpdateOracleDb.md index 62fd8245..29ec9be5 100644 --- a/docs/DynamicSecretUpdateOracleDb.md +++ b/docs/DynamicSecretUpdateOracleDb.md @@ -10,7 +10,7 @@ | **description** | **String** | Description of the object | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **oracle_host** | **String** | Oracle Host | [optional][default to '127.0.0.1'] | | **oracle_password** | **String** | Oracle Password | [optional] | | **oracle_port** | **String** | Oracle Port | [optional][default to '1521'] | diff --git a/docs/DynamicSecretUpdatePing.md b/docs/DynamicSecretUpdatePing.md index b028a43b..891d09c8 100644 --- a/docs/DynamicSecretUpdatePing.md +++ b/docs/DynamicSecretUpdatePing.md @@ -8,7 +8,7 @@ | **description** | **String** | Description of the object | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **ping_administrative_port** | **String** | Ping Federate administrative port | [optional][default to '9999'] | | **ping_atm_id** | **String** | Set a specific Access Token Management (ATM) instance for the created OAuth Client by providing the ATM Id. If no explicit value is given, the default pingfederate server ATM will be set. | [optional] | | **ping_authorization_port** | **String** | Ping Federate authorization port | [optional][default to '9031'] | diff --git a/docs/DynamicSecretUpdateVenafi.md b/docs/DynamicSecretUpdateVenafi.md index ad06f416..f45e3af9 100644 --- a/docs/DynamicSecretUpdateVenafi.md +++ b/docs/DynamicSecretUpdateVenafi.md @@ -13,7 +13,7 @@ | **enable_admin_rotation** | **Boolean** | Automatic admin credentials rotation | [optional][default to false] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Dynamic secret name | | -| **new_name** | **String** | Dynamic secret new name | [optional] | +| **new_name** | **String** | Dynamic secret name | [optional] | | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] | | **root_first_in_chain** | **Boolean** | Root first in chain | [optional] | | **sign_using_akeyless_pki** | **Boolean** | Use Akeyless PKI issuer or Venafi issuer | [optional] | diff --git a/docs/EmailPassAccessRules.md b/docs/EmailPassAccessRules.md index 2aa906f5..de20993a 100644 --- a/docs/EmailPassAccessRules.md +++ b/docs/EmailPassAccessRules.md @@ -8,6 +8,7 @@ | **email** | **String** | The Email value | [optional] | | **enc_email_with_shared_key** | **String** | EncEmailWithSharedKey is the email of this auth method, encrypted with the shared auth/uam key (for use in uam) | [optional] | | **hash_pass** | **String** | The password value | [optional] | +| **last_reset_password** | **Time** | The last password change date | [optional] | ## Example @@ -18,7 +19,8 @@ instance = Akeyless::EmailPassAccessRules.new( alg: null, email: null, enc_email_with_shared_key: null, - hash_pass: null + hash_pass: null, + last_reset_password: null ) ``` diff --git a/docs/EventForwarderCreateEmail.md b/docs/EventForwarderCreateEmail.md index 614152f9..92c447e2 100644 --- a/docs/EventForwarderCreateEmail.md +++ b/docs/EventForwarderCreateEmail.md @@ -7,10 +7,10 @@ | **auth_methods_event_source_locations** | **Array<String>** | Auth Method Event sources | [optional] | | **description** | **String** | Description of the object | [optional] | | **email_to** | **String** | A comma seperated list of email addresses to send event to | [optional] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **every** | **String** | Rate of periodic runner repetition in hours | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | -| **include_error** | **String** | Set this option to include event errors details [true\\false] | [optional] | +| **include_error** | **String** | Set this option to include event errors details [true/false] | [optional] | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **key** | **String** | The name of a key that used to encrypt the EventForwarder secret value (if empty, the account default protectionKey key will be used) | [optional] | diff --git a/docs/EventForwarderCreateServiceNow.md b/docs/EventForwarderCreateServiceNow.md index 0236b05b..b8fe9259 100644 --- a/docs/EventForwarderCreateServiceNow.md +++ b/docs/EventForwarderCreateServiceNow.md @@ -12,7 +12,7 @@ | **client_id** | **String** | The client ID to use when connecting with jwt authentication | [optional] | | **client_secret** | **String** | The client secret to use when connecting with jwt authentication | [optional] | | **description** | **String** | Description of the object | [optional] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **every** | **String** | Rate of periodic runner repetition in hours | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | | **host** | **String** | Workstation Host | [optional] | diff --git a/docs/EventForwarderCreateSlack.md b/docs/EventForwarderCreateSlack.md index e595dfc9..2d62d595 100644 --- a/docs/EventForwarderCreateSlack.md +++ b/docs/EventForwarderCreateSlack.md @@ -6,7 +6,7 @@ | ---- | ---- | ----------- | ----- | | **auth_methods_event_source_locations** | **Array<String>** | Auth Method Event sources | [optional] | | **description** | **String** | Description of the object | [optional] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **every** | **String** | Rate of periodic runner repetition in hours | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | diff --git a/docs/EventForwarderCreateWebhook.md b/docs/EventForwarderCreateWebhook.md index 9f72fd8e..46fdd469 100644 --- a/docs/EventForwarderCreateWebhook.md +++ b/docs/EventForwarderCreateWebhook.md @@ -9,7 +9,7 @@ | **auth_type** | **String** | The Webhook authentication type [user-pass, token, certificate] | [optional][default to 'user-pass'] | | **client_cert_data** | **String** | Base64 encoded PEM certificate, relevant for certificate auth-type | [optional] | | **description** | **String** | Description of the object | [optional] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **every** | **String** | Rate of periodic runner repetition in hours | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | diff --git a/docs/EventForwarderUpdateEmail.md b/docs/EventForwarderUpdateEmail.md index ae76aa8d..0ab725ad 100644 --- a/docs/EventForwarderUpdateEmail.md +++ b/docs/EventForwarderUpdateEmail.md @@ -8,9 +8,9 @@ | **description** | **String** | Description of the object | [optional] | | **email_to** | **String** | A comma seperated list of email addresses to send event to | [optional] | | **enable** | **String** | Enable/Disable Event Forwarder [true/false] | [optional][default to 'true'] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | -| **include_error** | **String** | Set this option to include event errors details [true\\false] | [optional] | +| **include_error** | **String** | Set this option to include event errors details [true/false] | [optional] | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] | diff --git a/docs/EventForwarderUpdateServiceNow.md b/docs/EventForwarderUpdateServiceNow.md index d14739a5..6c72f188 100644 --- a/docs/EventForwarderUpdateServiceNow.md +++ b/docs/EventForwarderUpdateServiceNow.md @@ -13,7 +13,7 @@ | **client_secret** | **String** | The client secret to use when connecting with jwt authentication | [optional] | | **description** | **String** | Description of the object | [optional] | | **enable** | **String** | Enable/Disable Event Forwarder [true/false] | [optional][default to 'true'] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | | **host** | **String** | Workstation Host | [optional] | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | diff --git a/docs/EventForwarderUpdateSlack.md b/docs/EventForwarderUpdateSlack.md index 90cb8d3f..03532eeb 100644 --- a/docs/EventForwarderUpdateSlack.md +++ b/docs/EventForwarderUpdateSlack.md @@ -7,7 +7,7 @@ | **auth_methods_event_source_locations** | **Array<String>** | Auth Method Event sources | [optional] | | **description** | **String** | Description of the object | [optional] | | **enable** | **String** | Enable/Disable Event Forwarder [true/false] | [optional][default to 'true'] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | diff --git a/docs/EventForwarderUpdateWebhook.md b/docs/EventForwarderUpdateWebhook.md index 1208de29..bc920ad0 100644 --- a/docs/EventForwarderUpdateWebhook.md +++ b/docs/EventForwarderUpdateWebhook.md @@ -10,7 +10,7 @@ | **client_cert_data** | **String** | Base64 encoded PEM certificate, relevant for certificate auth-type | [optional] | | **description** | **String** | Description of the object | [optional] | | **enable** | **String** | Enable/Disable Event Forwarder [true/false] | [optional][default to 'true'] | -| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | +| **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] | | **gateways_event_source_locations** | **Array<String>** | Event sources | | | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | diff --git a/docs/GatewayGetRemoteAccess.md b/docs/GatewayGetRemoteAccess.md new file mode 100644 index 00000000..472918d6 --- /dev/null +++ b/docs/GatewayGetRemoteAccess.md @@ -0,0 +1,22 @@ +# Akeyless::GatewayGetRemoteAccess + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GatewayGetRemoteAccess.new( + json: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GatewayUpdateItem.md b/docs/GatewayUpdateItem.md index ae8688b1..dab6708d 100644 --- a/docs/GatewayUpdateItem.md +++ b/docs/GatewayUpdateItem.md @@ -27,6 +27,7 @@ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected \\\"use-self-creds\\\" at rotator-creds-type, this username will try to rotate it's own password, if \\\"use-target-creds\\\" is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Rotation Hour | [optional][default to 0] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_creds_type** | **String** | The rotation credentials type | [optional][default to 'use-self-creds'] | @@ -63,6 +64,7 @@ instance = Akeyless::GatewayUpdateItem.new( rm_tag: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_creds_type: null, diff --git a/docs/GatewayUpdateRemoteAccess.md b/docs/GatewayUpdateRemoteAccess.md new file mode 100644 index 00000000..933b297a --- /dev/null +++ b/docs/GatewayUpdateRemoteAccess.md @@ -0,0 +1,36 @@ +# Akeyless::GatewayUpdateRemoteAccess + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **allowed_urls** | **String** | List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list) | [optional][default to 'use-existing'] | +| **hide_session_recording** | **String** | Specifies whether to show/hide if the session is currently recorded [true/false] | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **kexalgs** | **String** | Decide which algorithm will be used as part of the SSH initial hand-shake process | [optional][default to 'use-existing'] | +| **keyboard_layout** | **String** | Enable support for additional keyboard layouts | [optional][default to 'use-existing'] | +| **legacy_ssh_algorithm** | **String** | Signs SSH certificates using legacy ssh-rsa-cert-01@openssh.com signing algorithm [true/false] | [optional] | +| **rdp_target_configuration** | **String** | Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email | [optional][default to 'use-existing'] | +| **ssh_target_configuration** | **String** | Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email | [optional][default to 'use-existing'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GatewayUpdateRemoteAccess.new( + allowed_urls: null, + hide_session_recording: null, + json: null, + kexalgs: null, + keyboard_layout: null, + legacy_ssh_algorithm: null, + rdp_target_configuration: null, + ssh_target_configuration: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GatewayUpdateRemoteAccessRdpRecordings.md b/docs/GatewayUpdateRemoteAccessRdpRecordings.md new file mode 100644 index 00000000..38890823 --- /dev/null +++ b/docs/GatewayUpdateRemoteAccessRdpRecordings.md @@ -0,0 +1,46 @@ +# Akeyless::GatewayUpdateRemoteAccessRdpRecordings + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **aws_storage_access_key_id** | **String** | AWS access key id. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html | [optional] | +| **aws_storage_bucket_name** | **String** | The AWS bucket name. For more information refer to https://docs.aws.amazon.com/s3/ | [optional] | +| **aws_storage_bucket_prefix** | **String** | The folder name in S3 bucket. For more information refer to https://docs.aws.amazon.com/s3/ | [optional] | +| **aws_storage_region** | **String** | The region where the storage is located | [optional] | +| **aws_storage_secret_access_key** | **String** | AWS secret access key. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html | [optional] | +| **azure_storage_account_name** | **String** | Azure account name. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-overview | [optional] | +| **azure_storage_client_id** | **String** | Azure client id. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal | [optional] | +| **azure_storage_client_secret** | **String** | Azure client secret. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal | [optional] | +| **azure_storage_container_name** | **String** | Azure container name. For more information refer to https://learn.microsoft.com/en-us/rest/api/storageservices/naming-and-referencing-containers--blobs--and-metadata | [optional] | +| **azure_storage_tenant_id** | **String** | Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **rdp_session_recording** | **String** | Enable recording of rdp session [true/false] | [optional] | +| **rdp_session_storage** | **String** | Rdp session recording storage destination [local/aws/azure] | [optional] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GatewayUpdateRemoteAccessRdpRecordings.new( + aws_storage_access_key_id: null, + aws_storage_bucket_name: null, + aws_storage_bucket_prefix: null, + aws_storage_region: null, + aws_storage_secret_access_key: null, + azure_storage_account_name: null, + azure_storage_client_id: null, + azure_storage_client_secret: null, + azure_storage_container_name: null, + azure_storage_tenant_id: null, + json: null, + rdp_session_recording: null, + rdp_session_storage: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md b/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md new file mode 100644 index 00000000..7667f1db --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md @@ -0,0 +1,42 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3 + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **access_id** | **String** | AWS access id relevant for access_key auth-type | [optional] | +| **access_key** | **String** | AWS access key relevant for access_key auth-type | [optional] | +| **auth_type** | **String** | AWS auth type [access_key/cloud_id/assume_role] | [optional] | +| **bucket_name** | **String** | AWS S3 bucket name | [optional] | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **log_folder** | **String** | AWS S3 destination folder for logs | [optional][default to 'use-existing'] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **region** | **String** | AWS region | [optional] | +| **role_arn** | **String** | AWS role arn relevant for assume_role auth-type | [optional] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3.new( + access_id: null, + access_key: null, + auth_type: null, + bucket_name: null, + enable: null, + json: null, + log_folder: null, + output_format: null, + pull_interval: null, + region: null, + role_arn: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md b/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md new file mode 100644 index 00000000..5de23eb8 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md @@ -0,0 +1,32 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | +| **workspace_id** | **String** | Azure workspace id | [optional] | +| **workspace_key** | **String** | Azure workspace key | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics.new( + enable: null, + json: null, + output_format: null, + pull_interval: null, + token: null, + uid_token: null, + workspace_id: null, + workspace_key: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsDatadog.md b/docs/GwUpdateRemoteAccessSessionLogsDatadog.md new file mode 100644 index 00000000..44d606b5 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsDatadog.md @@ -0,0 +1,38 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsDatadog + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **api_key** | **String** | Datadog api key | [optional] | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **host** | **String** | Datadog host | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **log_service** | **String** | Datadog log service | [optional][default to 'use-existing'] | +| **log_source** | **String** | Datadog log source | [optional][default to 'use-existing'] | +| **log_tags** | **String** | A comma-separated list of Datadog log tags formatted as \"key:value\" strings | [optional][default to 'use-existing'] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsDatadog.new( + api_key: null, + enable: null, + host: null, + json: null, + log_service: null, + log_source: null, + log_tags: null, + output_format: null, + pull_interval: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md b/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md new file mode 100644 index 00000000..c6a8a57d --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md @@ -0,0 +1,48 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **api_key** | **String** | Elasticsearch api key relevant only for api_key auth-type | [optional] | +| **auth_type** | **String** | Elasticsearch auth type [api_key/password] | [optional] | +| **cloud_id** | **String** | Elasticsearch cloud id relevant only for cloud server-type | [optional] | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **enable_tls** | **Boolean** | Enable tls | [optional] | +| **index** | **String** | Elasticsearch index | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **nodes** | **String** | Elasticsearch nodes relevant only for nodes server-type | [optional] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **password** | **String** | Elasticsearch password relevant only for password auth-type | [optional] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **server_type** | **String** | Elasticsearch server type [cloud/nodes] | [optional] | +| **tls_certificate** | **String** | Elasticsearch tls certificate | [optional][default to 'use-existing'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | +| **user_name** | **String** | Elasticsearch user name relevant only for password auth-type | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch.new( + api_key: null, + auth_type: null, + cloud_id: null, + enable: null, + enable_tls: null, + index: null, + json: null, + nodes: null, + output_format: null, + password: null, + pull_interval: null, + server_type: null, + tls_certificate: null, + token: null, + uid_token: null, + user_name: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md b/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md new file mode 100644 index 00000000..d0bc91b6 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md @@ -0,0 +1,36 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **customer_id** | **String** | Google chronicle customer id | [optional] | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **log_type** | **String** | Google chronicle log type | [optional] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **region** | **String** | Google chronicle region [eu_multi_region/london/us_multi_region/singapore/tel_aviv] | [optional] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle.new( + customer_id: null, + enable: null, + gcp_key: null, + json: null, + log_type: null, + output_format: null, + pull_interval: null, + region: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsLogstash.md b/docs/GwUpdateRemoteAccessSessionLogsLogstash.md new file mode 100644 index 00000000..d8fb8d13 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsLogstash.md @@ -0,0 +1,36 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsLogstash + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **dns** | **String** | Logstash dns | [optional] | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **enable_tls** | **Boolean** | Enable tls | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **protocol** | **String** | Logstash protocol [tcp/udp] | [optional] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **tls_certificate** | **String** | Logstash tls certificate | [optional][default to 'use-existing'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsLogstash.new( + dns: null, + enable: null, + enable_tls: null, + json: null, + output_format: null, + protocol: null, + pull_interval: null, + tls_certificate: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md b/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md new file mode 100644 index 00000000..f29ff8e9 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md @@ -0,0 +1,32 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **logz_io_token** | **String** | Logz-io token | [optional] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **protocol** | **String** | LogzIo protocol [tcp/https] | [optional] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo.new( + enable: null, + json: null, + logz_io_token: null, + output_format: null, + protocol: null, + pull_interval: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsSplunk.md b/docs/GwUpdateRemoteAccessSessionLogsSplunk.md new file mode 100644 index 00000000..af02b405 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsSplunk.md @@ -0,0 +1,42 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsSplunk + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **enable_tls** | **Boolean** | Enable tls | [optional] | +| **index** | **String** | Splunk index | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **source** | **String** | Splunk source | [optional][default to 'use-existing'] | +| **source_type** | **String** | Splunk source type | [optional][default to 'use-existing'] | +| **splunk_token** | **String** | Splunk token | [optional] | +| **splunk_url** | **String** | Splunk server URL | [optional] | +| **tls_certificate** | **String** | Splunk tls certificate | [optional][default to 'use-existing'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsSplunk.new( + enable: null, + enable_tls: null, + index: null, + json: null, + output_format: null, + pull_interval: null, + source: null, + source_type: null, + splunk_token: null, + splunk_url: null, + tls_certificate: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsStdout.md b/docs/GwUpdateRemoteAccessSessionLogsStdout.md new file mode 100644 index 00000000..9c8a29a7 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsStdout.md @@ -0,0 +1,28 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsStdout + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsStdout.new( + enable: null, + json: null, + output_format: null, + pull_interval: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsSumologic.md b/docs/GwUpdateRemoteAccessSessionLogsSumologic.md new file mode 100644 index 00000000..c3b79f58 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsSumologic.md @@ -0,0 +1,34 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsSumologic + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **endpoint** | **String** | Sumologic endpoint URL | [optional] | +| **host** | **String** | Sumologic host | [optional][default to 'use-existing'] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **sumologic_tags** | **String** | A comma-separated list of Sumologic tags | [optional][default to 'use-existing'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsSumologic.new( + enable: null, + endpoint: null, + host: null, + json: null, + output_format: null, + pull_interval: null, + sumologic_tags: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/GwUpdateRemoteAccessSessionLogsSyslog.md b/docs/GwUpdateRemoteAccessSessionLogsSyslog.md new file mode 100644 index 00000000..b755ca86 --- /dev/null +++ b/docs/GwUpdateRemoteAccessSessionLogsSyslog.md @@ -0,0 +1,40 @@ +# Akeyless::GwUpdateRemoteAccessSessionLogsSyslog + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] | +| **enable_tls** | **Boolean** | Enable tls relevant only for network type TCP | [optional] | +| **formatter** | **String** | Syslog formatter [text/cef] | [optional][default to 'text'] | +| **host** | **String** | Syslog host | [optional] | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **network** | **String** | Syslog network [tcp/udp] | [optional][default to 'tcp'] | +| **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] | +| **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] | +| **target_tag** | **String** | Syslog target tag | [optional][default to 'use-existing'] | +| **tls_certificate** | **String** | Syslog tls certificate | [optional][default to 'use-existing'] | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::GwUpdateRemoteAccessSessionLogsSyslog.new( + enable: null, + enable_tls: null, + formatter: null, + host: null, + json: null, + network: null, + output_format: null, + pull_interval: null, + target_tag: null, + tls_certificate: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/ItemGeneralInfo.md b/docs/ItemGeneralInfo.md index dde279f2..97191d0d 100644 --- a/docs/ItemGeneralInfo.md +++ b/docs/ItemGeneralInfo.md @@ -12,7 +12,9 @@ | **cluster_gw_url** | **String** | | [optional] | | **display_metadata** | **String** | | [optional] | | **dynamic_secret_producer_details** | [**DynamicSecretProducerInfo**](DynamicSecretProducerInfo.md) | | [optional] | +| **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] | | **importer_info** | [**ImporterInfo**](ImporterInfo.md) | | [optional] | +| **next_rotation_events** | [**Array<NextAutoRotationEvent>**](NextAutoRotationEvent.md) | | [optional] | | **oidc_client_info** | [**OidcClientInfo**](OidcClientInfo.md) | | [optional] | | **password_policy** | [**PasswordPolicyInfo**](PasswordPolicyInfo.md) | | [optional] | | **rotated_secret_details** | [**RotatedSecretDetailsInfo**](RotatedSecretDetailsInfo.md) | | [optional] | @@ -34,7 +36,9 @@ instance = Akeyless::ItemGeneralInfo.new( cluster_gw_url: null, display_metadata: null, dynamic_secret_producer_details: null, + expiration_events: null, importer_info: null, + next_rotation_events: null, oidc_client_info: null, password_policy: null, rotated_secret_details: null, diff --git a/docs/NextAutoRotationEvent.md b/docs/NextAutoRotationEvent.md new file mode 100644 index 00000000..66f01f41 --- /dev/null +++ b/docs/NextAutoRotationEvent.md @@ -0,0 +1,18 @@ +# Akeyless::NextAutoRotationEvent + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **seconds_before** | **Integer** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::NextAutoRotationEvent.new( + seconds_before: null +) +``` + diff --git a/docs/PasswordExpirationInfo.md b/docs/PasswordExpirationInfo.md new file mode 100644 index 00000000..47f4edc0 --- /dev/null +++ b/docs/PasswordExpirationInfo.md @@ -0,0 +1,24 @@ +# Akeyless::PasswordExpirationInfo + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **days_before_expire** | **Integer** | | [optional] | +| **days_before_notification** | **Integer** | | [optional] | +| **days_until_expire** | **Integer** | r/o calculated parameter | [optional] | +| **enable** | **Boolean** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::PasswordExpirationInfo.new( + days_before_expire: null, + days_before_notification: null, + days_until_expire: null, + enable: null +) +``` + diff --git a/docs/ResetAccessKey.md b/docs/ResetAccessKey.md new file mode 100644 index 00000000..36826331 --- /dev/null +++ b/docs/ResetAccessKey.md @@ -0,0 +1,24 @@ +# Akeyless::ResetAccessKey + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **json** | **Boolean** | Set output format to JSON | [optional][default to false] | +| **name** | **String** | Auth Method name | | +| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | +| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::ResetAccessKey.new( + json: null, + name: null, + token: null, + uid_token: null +) +``` + diff --git a/docs/ResetAuthMethodAccessKeyOutput.md b/docs/ResetAuthMethodAccessKeyOutput.md new file mode 100644 index 00000000..878ca3aa --- /dev/null +++ b/docs/ResetAuthMethodAccessKeyOutput.md @@ -0,0 +1,18 @@ +# Akeyless::ResetAuthMethodAccessKeyOutput + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **access_key** | **String** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::ResetAuthMethodAccessKeyOutput.new( + access_key: null +) +``` + diff --git a/docs/RollbackSecret.md b/docs/RollbackSecret.md index d9b7c361..fe36e5c0 100644 --- a/docs/RollbackSecret.md +++ b/docs/RollbackSecret.md @@ -4,6 +4,7 @@ | Name | Type | Description | Notes | | ---- | ---- | ----------- | ----- | +| **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Secret name | | | **old_version** | **Integer** | Old secret version to rollback to | | @@ -16,6 +17,7 @@ require 'akeyless' instance = Akeyless::RollbackSecret.new( + accessibility: null, json: null, name: null, old_version: null, diff --git a/docs/RotatedSecretCreateAws.md b/docs/RotatedSecretCreateAws.md index b20cb275..c4d3a5ca 100644 --- a/docs/RotatedSecretCreateAws.md +++ b/docs/RotatedSecretCreateAws.md @@ -18,6 +18,7 @@ | **name** | **String** | Rotated secret name | | | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/api-key] | | @@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretCreateAws.new( name: null, password_length: null, rotate_after_disconnect: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateAzure.md b/docs/RotatedSecretCreateAzure.md index 58d10bc7..1e8359ed 100644 --- a/docs/RotatedSecretCreateAzure.md +++ b/docs/RotatedSecretCreateAzure.md @@ -17,6 +17,7 @@ | **name** | **String** | Rotated secret name | | | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password/api-key/azure-storage-account] | | @@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretCreateAzure.new( name: null, password_length: null, rotate_after_disconnect: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateCassandra.md b/docs/RotatedSecretCreateCassandra.md index d53a6870..8612057b 100644 --- a/docs/RotatedSecretCreateCassandra.md +++ b/docs/RotatedSecretCreateCassandra.md @@ -15,6 +15,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateCassandra.new( password_length: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateCustom.md b/docs/RotatedSecretCreateCustom.md index 2fec958d..c9bbbb88 100644 --- a/docs/RotatedSecretCreateCustom.md +++ b/docs/RotatedSecretCreateCustom.md @@ -15,6 +15,7 @@ | **name** | **String** | Rotated secret name | | | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] | @@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateCustom.new( name: null, password_length: null, rotate_after_disconnect: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_allow_external_user: null, diff --git a/docs/RotatedSecretCreateDockerhub.md b/docs/RotatedSecretCreateDockerhub.md index 27d38fb4..a352c956 100644 --- a/docs/RotatedSecretCreateDockerhub.md +++ b/docs/RotatedSecretCreateDockerhub.md @@ -13,6 +13,7 @@ | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] | | **name** | **String** | Rotated secret name | | | **password_length** | **String** | The length of the password to be generated | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **tags** | **Array<String>** | Add tags attached to this object | [optional] | @@ -35,6 +36,7 @@ instance = Akeyless::RotatedSecretCreateDockerhub.new( max_versions: null, name: null, password_length: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, tags: null, diff --git a/docs/RotatedSecretCreateGcp.md b/docs/RotatedSecretCreateGcp.md index 613b6643..917ae035 100644 --- a/docs/RotatedSecretCreateGcp.md +++ b/docs/RotatedSecretCreateGcp.md @@ -16,6 +16,7 @@ | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] | | **name** | **String** | Rotated secret name | | | **password_length** | **String** | The length of the password to be generated | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | | @@ -42,6 +43,7 @@ instance = Akeyless::RotatedSecretCreateGcp.new( max_versions: null, name: null, password_length: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateHanadb.md b/docs/RotatedSecretCreateHanadb.md index c21a3ab2..13fa6c0c 100644 --- a/docs/RotatedSecretCreateHanadb.md +++ b/docs/RotatedSecretCreateHanadb.md @@ -15,6 +15,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateHanadb.new( password_length: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateLdap.md b/docs/RotatedSecretCreateLdap.md index 367c8be0..4317eca6 100644 --- a/docs/RotatedSecretCreateLdap.md +++ b/docs/RotatedSecretCreateLdap.md @@ -18,6 +18,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/ldap] | | @@ -56,6 +57,7 @@ instance = Akeyless::RotatedSecretCreateLdap.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateMongodb.md b/docs/RotatedSecretCreateMongodb.md index efabccea..fa19d1b3 100644 --- a/docs/RotatedSecretCreateMongodb.md +++ b/docs/RotatedSecretCreateMongodb.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMongodb.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateMssql.md b/docs/RotatedSecretCreateMssql.md index f1bb329f..81b16515 100644 --- a/docs/RotatedSecretCreateMssql.md +++ b/docs/RotatedSecretCreateMssql.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateMssql.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateMysql.md b/docs/RotatedSecretCreateMysql.md index 708849df..549998cb 100644 --- a/docs/RotatedSecretCreateMysql.md +++ b/docs/RotatedSecretCreateMysql.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMysql.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateOracledb.md b/docs/RotatedSecretCreateOracledb.md index f4899cce..74375432 100644 --- a/docs/RotatedSecretCreateOracledb.md +++ b/docs/RotatedSecretCreateOracledb.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretCreateOracledb.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreatePostgresql.md b/docs/RotatedSecretCreatePostgresql.md index 0763bbdb..3bdc1fab 100644 --- a/docs/RotatedSecretCreatePostgresql.md +++ b/docs/RotatedSecretCreatePostgresql.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreatePostgresql.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateRedis.md b/docs/RotatedSecretCreateRedis.md index 178a7566..72d7af27 100644 --- a/docs/RotatedSecretCreateRedis.md +++ b/docs/RotatedSecretCreateRedis.md @@ -15,6 +15,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateRedis.new( password_length: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateRedshift.md b/docs/RotatedSecretCreateRedshift.md index 87911832..619199ec 100644 --- a/docs/RotatedSecretCreateRedshift.md +++ b/docs/RotatedSecretCreateRedshift.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretCreateRedshift.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateSnowflake.md b/docs/RotatedSecretCreateSnowflake.md index 8edddb33..d85cd4e0 100644 --- a/docs/RotatedSecretCreateSnowflake.md +++ b/docs/RotatedSecretCreateSnowflake.md @@ -15,6 +15,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateSnowflake.new( password_length: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretCreateSsh.md b/docs/RotatedSecretCreateSsh.md index 09c294a3..c01bf419 100644 --- a/docs/RotatedSecretCreateSsh.md +++ b/docs/RotatedSecretCreateSsh.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] | @@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateSsh.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_custom_cmd: null, diff --git a/docs/RotatedSecretCreateWindows.md b/docs/RotatedSecretCreateWindows.md index 04214ef3..1e0c09a5 100644 --- a/docs/RotatedSecretCreateWindows.md +++ b/docs/RotatedSecretCreateWindows.md @@ -16,6 +16,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateWindows.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretUpdateAws.md b/docs/RotatedSecretUpdateAws.md index 8c72b0e1..db9b3eff 100644 --- a/docs/RotatedSecretUpdateAws.md +++ b/docs/RotatedSecretUpdateAws.md @@ -22,6 +22,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_aws_account_id** | **String** | The AWS account id | [optional] | @@ -55,6 +56,7 @@ instance = Akeyless::RotatedSecretUpdateAws.new( password_length: null, rm_tag: null, rotate_after_disconnect: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_aws_account_id: null, diff --git a/docs/RotatedSecretUpdateAzure.md b/docs/RotatedSecretUpdateAzure.md index d2b90e5e..35d36096 100644 --- a/docs/RotatedSecretUpdateAzure.md +++ b/docs/RotatedSecretUpdateAzure.md @@ -21,6 +21,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_disable_concurrent_connections** | **Boolean** | Enable this flag to prevent simultaneous use of the same secret | [optional] | @@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateAzure.new( password_length: null, rm_tag: null, rotate_after_disconnect: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_disable_concurrent_connections: null, diff --git a/docs/RotatedSecretUpdateCassandra.md b/docs/RotatedSecretUpdateCassandra.md index cf6038ba..e29fd7d6 100644 --- a/docs/RotatedSecretUpdateCassandra.md +++ b/docs/RotatedSecretUpdateCassandra.md @@ -19,6 +19,7 @@ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | @@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateCassandra.new( rm_tag: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, token: null, diff --git a/docs/RotatedSecretUpdateCustom.md b/docs/RotatedSecretUpdateCustom.md index d96d1dcb..62313b00 100644 --- a/docs/RotatedSecretUpdateCustom.md +++ b/docs/RotatedSecretUpdateCustom.md @@ -19,6 +19,7 @@ | **password_length** | **String** | The length of the password to be generated | [optional] | | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] | @@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new( password_length: null, rm_tag: null, rotate_after_disconnect: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_allow_external_user: null, diff --git a/docs/RotatedSecretUpdateDockerhub.md b/docs/RotatedSecretUpdateDockerhub.md index 880fc352..f86183df 100644 --- a/docs/RotatedSecretUpdateDockerhub.md +++ b/docs/RotatedSecretUpdateDockerhub.md @@ -17,6 +17,7 @@ | **new_name** | **String** | New item name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | @@ -41,6 +42,7 @@ instance = Akeyless::RotatedSecretUpdateDockerhub.new( new_name: null, password_length: null, rm_tag: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, token: null, diff --git a/docs/RotatedSecretUpdateGcp.md b/docs/RotatedSecretUpdateGcp.md index 35062d4e..f46b4954 100644 --- a/docs/RotatedSecretUpdateGcp.md +++ b/docs/RotatedSecretUpdateGcp.md @@ -20,6 +20,7 @@ | **new_name** | **String** | New item name | [optional] | | **password_length** | **String** | The length of the password to be generated | [optional] | | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | | @@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateGcp.new( new_name: null, password_length: null, rm_tag: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/RotatedSecretUpdateHanadb.md b/docs/RotatedSecretUpdateHanadb.md index 85ee17d8..bf694a67 100644 --- a/docs/RotatedSecretUpdateHanadb.md +++ b/docs/RotatedSecretUpdateHanadb.md @@ -19,6 +19,7 @@ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | @@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateHanadb.new( rm_tag: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, token: null, diff --git a/docs/RotatedSecretUpdateLdap.md b/docs/RotatedSecretUpdateLdap.md index 903b2286..05a6e1b6 100644 --- a/docs/RotatedSecretUpdateLdap.md +++ b/docs/RotatedSecretUpdateLdap.md @@ -22,6 +22,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] | @@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_enable: null, diff --git a/docs/RotatedSecretUpdateMongodb.md b/docs/RotatedSecretUpdateMongodb.md index a8a82178..2b7c7b03 100644 --- a/docs/RotatedSecretUpdateMongodb.md +++ b/docs/RotatedSecretUpdateMongodb.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | @@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_bastion_issuer: null, diff --git a/docs/RotatedSecretUpdateMssql.md b/docs/RotatedSecretUpdateMssql.md index 4e34486c..93675e82 100644 --- a/docs/RotatedSecretUpdateMssql.md +++ b/docs/RotatedSecretUpdateMssql.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | @@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_bastion_issuer: null, diff --git a/docs/RotatedSecretUpdateMysql.md b/docs/RotatedSecretUpdateMysql.md index dd693062..535c23f0 100644 --- a/docs/RotatedSecretUpdateMysql.md +++ b/docs/RotatedSecretUpdateMysql.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | @@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_bastion_issuer: null, diff --git a/docs/RotatedSecretUpdateOracledb.md b/docs/RotatedSecretUpdateOracledb.md index c5f305d7..cce8bc93 100644 --- a/docs/RotatedSecretUpdateOracledb.md +++ b/docs/RotatedSecretUpdateOracledb.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] | @@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_db_name: null, diff --git a/docs/RotatedSecretUpdatePostgresql.md b/docs/RotatedSecretUpdatePostgresql.md index 3dc4f872..cc6cd176 100644 --- a/docs/RotatedSecretUpdatePostgresql.md +++ b/docs/RotatedSecretUpdatePostgresql.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] | @@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_bastion_issuer: null, diff --git a/docs/RotatedSecretUpdateRedis.md b/docs/RotatedSecretUpdateRedis.md index 981009d7..20832d64 100644 --- a/docs/RotatedSecretUpdateRedis.md +++ b/docs/RotatedSecretUpdateRedis.md @@ -19,6 +19,7 @@ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | @@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateRedis.new( rm_tag: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, token: null, diff --git a/docs/RotatedSecretUpdateRedshift.md b/docs/RotatedSecretUpdateRedshift.md index f653b8b7..ce8a1abb 100644 --- a/docs/RotatedSecretUpdateRedshift.md +++ b/docs/RotatedSecretUpdateRedshift.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] | @@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretUpdateRedshift.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, secure_access_db_name: null, diff --git a/docs/RotatedSecretUpdateSnowflake.md b/docs/RotatedSecretUpdateSnowflake.md index eba43c98..3fe03ce0 100644 --- a/docs/RotatedSecretUpdateSnowflake.md +++ b/docs/RotatedSecretUpdateSnowflake.md @@ -19,6 +19,7 @@ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | @@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateSnowflake.new( rm_tag: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, token: null, diff --git a/docs/RotatedSecretUpdateSsh.md b/docs/RotatedSecretUpdateSsh.md index 0f6a334d..0cad5c37 100644 --- a/docs/RotatedSecretUpdateSsh.md +++ b/docs/RotatedSecretUpdateSsh.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] | @@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_custom_cmd: null, diff --git a/docs/RotatedSecretUpdateWindows.md b/docs/RotatedSecretUpdateWindows.md index 9b81b30f..149cdb78 100644 --- a/docs/RotatedSecretUpdateWindows.md +++ b/docs/RotatedSecretUpdateWindows.md @@ -20,6 +20,7 @@ | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] | | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] | | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] | | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] | | **rotator_type** | **String** | The rotator type. options: [target/password] | | @@ -54,6 +55,7 @@ instance = Akeyless::RotatedSecretUpdateWindows.new( rotate_after_disconnect: null, rotated_password: null, rotated_username: null, + rotation_event_in: null, rotation_hour: null, rotation_interval: null, rotator_type: null, diff --git a/docs/SshBastionConf.md b/docs/SshBastionConf.md new file mode 100644 index 00000000..5a251d05 --- /dev/null +++ b/docs/SshBastionConf.md @@ -0,0 +1,24 @@ +# Akeyless::SshBastionConf + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **hide_session_recording** | **Boolean** | | [optional] | +| **kexalgs** | **String** | | [optional] | +| **log_forwarding** | [**LogForwardingConfigPart**](LogForwardingConfigPart.md) | | [optional] | +| **session_termination** | [**SshBastionSessionTermination**](SshBastionSessionTermination.md) | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::SshBastionConf.new( + hide_session_recording: null, + kexalgs: null, + log_forwarding: null, + session_termination: null +) +``` + diff --git a/docs/SshBastionSessionTermination.md b/docs/SshBastionSessionTermination.md new file mode 100644 index 00000000..59208f19 --- /dev/null +++ b/docs/SshBastionSessionTermination.md @@ -0,0 +1,26 @@ +# Akeyless::SshBastionSessionTermination + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **api_password** | **String** | | [optional] | +| **api_token** | **String** | | [optional] | +| **api_url** | **String** | | [optional] | +| **api_username** | **String** | | [optional] | +| **enabled** | **Boolean** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::SshBastionSessionTermination.new( + api_password: null, + api_token: null, + api_url: null, + api_username: null, + enabled: null +) +``` + diff --git a/docs/UpdateAccountSettings.md b/docs/UpdateAccountSettings.md index 3e8e6c24..b772503b 100644 --- a/docs/UpdateAccountSettings.md +++ b/docs/UpdateAccountSettings.md @@ -16,6 +16,7 @@ | **dynamic_secret_max_ttl** | **Integer** | Set the maximum ttl for dynamic secrets | [optional] | | **dynamic_secret_max_ttl_enable** | **String** | Set a maximum ttl for dynamic secrets [true/false] | [optional] | | **enable_item_sharing** | **String** | Enable sharing items [true/false] | [optional] | +| **enable_password_expiration** | **String** | Enable password expiration policy [true/false] | [optional] | | **force_new_versions** | **String** | If set to true, new version will be created on update | [optional] | | **gw_bound_ips** | **Array<String>** | A default list of comma-separated CIDR block that acts as a trusted Gateway entity. | [optional] | | **invalid_characters** | **String** | Characters that cannot be used for items/targets/roles/auths/event_forwarder names. Empty string will enforce nothing. | [optional][default to 'notReceivedInvalidCharacter'] | @@ -31,6 +32,8 @@ | **max_rotation_interval** | **Integer** | Set the maximum rotation interval for rotated secrets auto rotation settings | [optional] | | **max_rotation_interval_enable** | **String** | Set a maximum rotation interval for rotated secrets auto rotation settings [true/false] | [optional] | | **max_versions** | **String** | Max versions | [optional] | +| **password_expiration_days** | **String** | Specifies the number of days that a password is valid before it must be changed. A default value of 90 days is used. | [optional] | +| **password_expiration_notification_days** | **String** | Specifies the number of days before a user receives notification that their password will expire. A default value of 14 days is used. | [optional] | | **password_length** | **Integer** | Password length between 5 - to 50 characters | [optional] | | **phone** | **String** | Phone number | [optional] | | **postal_code** | **String** | Postal code | [optional] | @@ -62,6 +65,7 @@ instance = Akeyless::UpdateAccountSettings.new( dynamic_secret_max_ttl: null, dynamic_secret_max_ttl_enable: null, enable_item_sharing: null, + enable_password_expiration: null, force_new_versions: null, gw_bound_ips: null, invalid_characters: null, @@ -77,6 +81,8 @@ instance = Akeyless::UpdateAccountSettings.new( max_rotation_interval: null, max_rotation_interval_enable: null, max_versions: null, + password_expiration_days: null, + password_expiration_notification_days: null, password_length: null, phone: null, postal_code: null, diff --git a/docs/UpdateItem.md b/docs/UpdateItem.md index c2a1d8d2..95a4c54c 100644 --- a/docs/UpdateItem.md +++ b/docs/UpdateItem.md @@ -11,6 +11,7 @@ | **change_event** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] | | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] | | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] | +| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] | | **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] | @@ -60,6 +61,7 @@ instance = Akeyless::UpdateItem.new( change_event: null, delete_protection: null, description: null, + expiration_event_in: null, host_provider: null, json: null, max_versions: null, diff --git a/docs/UpdateRotationSettings.md b/docs/UpdateRotationSettings.md index 3c8409e4..932abecd 100644 --- a/docs/UpdateRotationSettings.md +++ b/docs/UpdateRotationSettings.md @@ -7,6 +7,7 @@ | **auto_rotate** | **Boolean** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation | | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **name** | **String** | Key name | | +| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] | | **rotation_interval** | **Integer** | The number of days to wait between every automatic key rotation (7-365) | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | @@ -20,6 +21,7 @@ instance = Akeyless::UpdateRotationSettings.new( auto_rotate: null, json: null, name: null, + rotation_event_in: null, rotation_interval: null, token: null, uid_token: null diff --git a/docs/UpdateTarget.md b/docs/UpdateTarget.md index cd2489de..b12ce79c 100644 --- a/docs/UpdateTarget.md +++ b/docs/UpdateTarget.md @@ -9,7 +9,7 @@ | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] | | **name** | **String** | Target name | | | **new_comment** | **String** | Deprecated - use description | [optional][default to 'default_comment'] | -| **new_name** | **String** | New Target name | [optional] | +| **new_name** | **String** | New target name | [optional] | | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] | | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] | diff --git a/docs/UploadRSA.md b/docs/UploadRSA.md index 15ac1bee..8f4ee732 100644 --- a/docs/UploadRSA.md +++ b/docs/UploadRSA.md @@ -10,6 +10,7 @@ | **customer_frg_id** | **String** | The customer fragment ID that will be used to split the key (if empty, the key will be created independently of a customer fragment) | [optional] | | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] | | **description** | **String** | Description of the object | [optional] | +| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] | | **json** | **Boolean** | Set output format to JSON | [optional][default to false] | | **metadata** | **String** | Deprecated - use description | [optional] | | **name** | **String** | Name of key to be created | | @@ -32,6 +33,7 @@ instance = Akeyless::UploadRSA.new( customer_frg_id: null, delete_protection: null, description: null, + expiration_event_in: null, json: null, metadata: null, name: null, diff --git a/docs/V2Api.md b/docs/V2Api.md index d82abdc2..dd5db4c3 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -4,7 +4,7 @@ All URIs are relative to *https://api.akeyless.io* | Method | HTTP request | Description | | ------ | ------------ | ----------- | -| [**alias_details**](V2Api.md#alias_details) | **GET** /alias-details | | +| [**alias_details**](V2Api.md#alias_details) | **POST** /alias-details | | | [**assoc_role_auth_method**](V2Api.md#assoc_role_auth_method) | **POST** /assoc-role-am | | | [**assoc_target_item**](V2Api.md#assoc_target_item) | **POST** /assoc-target-item | | | [**auth**](V2Api.md#auth) | **POST** /auth | | @@ -246,6 +246,7 @@ All URIs are relative to *https://api.akeyless.io* | [**gateway_get_log_forwarding**](V2Api.md#gateway_get_log_forwarding) | **POST** /gateway-get-log-forwarding | | | [**gateway_get_migration**](V2Api.md#gateway_get_migration) | **POST** /gateway-get-migration | | | [**gateway_get_producer**](V2Api.md#gateway_get_producer) | **POST** /gateway-get-producer | | +| [**gateway_get_remote_access**](V2Api.md#gateway_get_remote_access) | **POST** /gateway-get-remote-access | | | [**gateway_get_tmp_users**](V2Api.md#gateway_get_tmp_users) | **POST** /gateway-get-producer-tmp-creds | | | [**gateway_list_customer_fragments**](V2Api.md#gateway_list_customer_fragments) | **POST** /gateway-list-customer-fragments | | | [**gateway_list_migration**](V2Api.md#gateway_list_migration) | **POST** /gateway-list-migration | | @@ -301,6 +302,8 @@ All URIs are relative to *https://api.akeyless.io* | [**gateway_update_producer_redshift**](V2Api.md#gateway_update_producer_redshift) | **POST** /gateway-update-producer-redshift | | | [**gateway_update_producer_snowflake**](V2Api.md#gateway_update_producer_snowflake) | **POST** /gateway-update-producer-snowflake | | | [**gateway_update_producer_venafi**](V2Api.md#gateway_update_producer_venafi) | **POST** /gateway-update-producer-certificate-automation | | +| [**gateway_update_remote_access**](V2Api.md#gateway_update_remote_access) | **POST** /gateway-update-remote-access | | +| [**gateway_update_remote_access_rdp_recordings**](V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording | | | [**gateway_update_tls_cert**](V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert | | | [**gateway_update_tmp_users**](V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds | | | [**generate_csr**](V2Api.md#generate_csr) | **POST** /generate-csr | | @@ -323,6 +326,17 @@ All URIs are relative to *https://api.akeyless.io* | [**get_tags**](V2Api.md#get_tags) | **POST** /get-tags | | | [**get_target**](V2Api.md#get_target) | **POST** /get-target | | | [**get_target_details**](V2Api.md#get_target_details) | **POST** /get-target-details | | +| [**gw_update_remote_access_session_logs_aws_s3**](V2Api.md#gw_update_remote_access_session_logs_aws_s3) | **POST** /gateway-update-remote-access-session-forwarding-aws-s3 | | +| [**gw_update_remote_access_session_logs_azure_analytics**](V2Api.md#gw_update_remote_access_session_logs_azure_analytics) | **POST** /gateway-update-remote-access-session-forwarding-azure-analytics | | +| [**gw_update_remote_access_session_logs_datadog**](V2Api.md#gw_update_remote_access_session_logs_datadog) | **POST** /gateway-update-remote-access-session-forwarding-datadog | | +| [**gw_update_remote_access_session_logs_elasticsearch**](V2Api.md#gw_update_remote_access_session_logs_elasticsearch) | **POST** /gateway-update-remote-access-session-forwarding-elasticsearch | | +| [**gw_update_remote_access_session_logs_google_chronicle**](V2Api.md#gw_update_remote_access_session_logs_google_chronicle) | **POST** /gateway-update-remote-access-session-forwarding-google-chronicle | | +| [**gw_update_remote_access_session_logs_logstash**](V2Api.md#gw_update_remote_access_session_logs_logstash) | **POST** /gateway-update-remote-access-session-forwarding-logstash | | +| [**gw_update_remote_access_session_logs_logz_io**](V2Api.md#gw_update_remote_access_session_logs_logz_io) | **POST** /gateway-update-remote-access-session-forwarding-logz-io | | +| [**gw_update_remote_access_session_logs_splunk**](V2Api.md#gw_update_remote_access_session_logs_splunk) | **POST** /gateway-update-remote-access-session-forwarding-splunk | | +| [**gw_update_remote_access_session_logs_stdout**](V2Api.md#gw_update_remote_access_session_logs_stdout) | **POST** /gateway-update-remote-access-session-forwarding-stdout | | +| [**gw_update_remote_access_session_logs_sumologic**](V2Api.md#gw_update_remote_access_session_logs_sumologic) | **POST** /gateway-update-remote-access-session-forwarding-sumologic | | +| [**gw_update_remote_access_session_logs_syslog**](V2Api.md#gw_update_remote_access_session_logs_syslog) | **POST** /gateway-update-remote-access-session-forwarding-syslog | | | [**hmac**](V2Api.md#hmac) | **POST** /hmac | | | [**import_passwords**](V2Api.md#import_passwords) | **POST** /import-passwords | | | [**kmip_client_delete_rule**](V2Api.md#kmip_client_delete_rule) | **POST** /kmip-client-delete-rule | | @@ -15552,6 +15566,68 @@ No authorization required - **Accept**: application/json +## gateway_get_remote_access + +> gateway_get_remote_access(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GatewayGetRemoteAccess.new # GatewayGetRemoteAccess | + +begin + + result = api_instance.gateway_get_remote_access(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gateway_get_remote_access: #{e}" +end +``` + +#### Using the gateway_get_remote_access_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gateway_get_remote_access_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gateway_get_remote_access_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gateway_get_remote_access_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GatewayGetRemoteAccess**](GatewayGetRemoteAccess.md) | | | + +### Return type + +[**BastionConfigReplyObj**](BastionConfigReplyObj.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + ## gateway_get_tmp_users > > gateway_get_tmp_users(body) @@ -18965,6 +19041,127 @@ No authorization required - **Accept**: application/json +## gateway_update_remote_access + +> Object gateway_update_remote_access + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new + +begin + + result = api_instance.gateway_update_remote_access + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gateway_update_remote_access: #{e}" +end +``` + +#### Using the gateway_update_remote_access_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> gateway_update_remote_access_with_http_info + +```ruby +begin + + data, status_code, headers = api_instance.gateway_update_remote_access_with_http_info + p status_code # => 2xx + p headers # => { ... } + p data # => Object +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gateway_update_remote_access_with_http_info: #{e}" +end +``` + +### Parameters + +This endpoint does not need any parameter. + +### Return type + +**Object** + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: Not defined +- **Accept**: application/json + + +## gateway_update_remote_access_rdp_recordings + +> Object gateway_update_remote_access_rdp_recordings(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GatewayUpdateRemoteAccessRdpRecordings.new # GatewayUpdateRemoteAccessRdpRecordings | + +begin + + result = api_instance.gateway_update_remote_access_rdp_recordings(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gateway_update_remote_access_rdp_recordings: #{e}" +end +``` + +#### Using the gateway_update_remote_access_rdp_recordings_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> gateway_update_remote_access_rdp_recordings_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gateway_update_remote_access_rdp_recordings_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => Object +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gateway_update_remote_access_rdp_recordings_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GatewayUpdateRemoteAccessRdpRecordings**](GatewayUpdateRemoteAccessRdpRecordings.md) | | | + +### Return type + +**Object** + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + ## gateway_update_tls_cert > gateway_update_tls_cert(body) @@ -20325,6 +20522,688 @@ No authorization required - **Accept**: application/json +## gw_update_remote_access_session_logs_aws_s3 + +> gw_update_remote_access_session_logs_aws_s3(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3.new # GwUpdateRemoteAccessSessionLogsAwsS3 | + +begin + + result = api_instance.gw_update_remote_access_session_logs_aws_s3(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_aws_s3: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_aws_s3_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_aws_s3_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_aws_s3_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_aws_s3_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsAwsS3**](GwUpdateRemoteAccessSessionLogsAwsS3.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_azure_analytics + +> gw_update_remote_access_session_logs_azure_analytics(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics.new # GwUpdateRemoteAccessSessionLogsAzureAnalytics | + +begin + + result = api_instance.gw_update_remote_access_session_logs_azure_analytics(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_azure_analytics: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_azure_analytics_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_azure_analytics_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_azure_analytics_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_azure_analytics_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsAzureAnalytics**](GwUpdateRemoteAccessSessionLogsAzureAnalytics.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_datadog + +> gw_update_remote_access_session_logs_datadog(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsDatadog.new # GwUpdateRemoteAccessSessionLogsDatadog | + +begin + + result = api_instance.gw_update_remote_access_session_logs_datadog(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_datadog: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_datadog_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_datadog_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_datadog_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_datadog_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsDatadog**](GwUpdateRemoteAccessSessionLogsDatadog.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_elasticsearch + +> gw_update_remote_access_session_logs_elasticsearch(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch.new # GwUpdateRemoteAccessSessionLogsElasticsearch | + +begin + + result = api_instance.gw_update_remote_access_session_logs_elasticsearch(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_elasticsearch: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_elasticsearch_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_elasticsearch_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_elasticsearch_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_elasticsearch_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsElasticsearch**](GwUpdateRemoteAccessSessionLogsElasticsearch.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_google_chronicle + +> gw_update_remote_access_session_logs_google_chronicle(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle.new # GwUpdateRemoteAccessSessionLogsGoogleChronicle | + +begin + + result = api_instance.gw_update_remote_access_session_logs_google_chronicle(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_google_chronicle: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_google_chronicle_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_google_chronicle_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_google_chronicle_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_google_chronicle_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsGoogleChronicle**](GwUpdateRemoteAccessSessionLogsGoogleChronicle.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_logstash + +> gw_update_remote_access_session_logs_logstash(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsLogstash.new # GwUpdateRemoteAccessSessionLogsLogstash | + +begin + + result = api_instance.gw_update_remote_access_session_logs_logstash(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_logstash: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_logstash_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_logstash_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_logstash_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_logstash_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsLogstash**](GwUpdateRemoteAccessSessionLogsLogstash.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_logz_io + +> gw_update_remote_access_session_logs_logz_io(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo.new # GwUpdateRemoteAccessSessionLogsLogzIo | + +begin + + result = api_instance.gw_update_remote_access_session_logs_logz_io(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_logz_io: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_logz_io_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_logz_io_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_logz_io_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_logz_io_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsLogzIo**](GwUpdateRemoteAccessSessionLogsLogzIo.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_splunk + +> gw_update_remote_access_session_logs_splunk(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsSplunk.new # GwUpdateRemoteAccessSessionLogsSplunk | + +begin + + result = api_instance.gw_update_remote_access_session_logs_splunk(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_splunk: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_splunk_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_splunk_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_splunk_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_splunk_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsSplunk**](GwUpdateRemoteAccessSessionLogsSplunk.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_stdout + +> gw_update_remote_access_session_logs_stdout(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsStdout.new # GwUpdateRemoteAccessSessionLogsStdout | + +begin + + result = api_instance.gw_update_remote_access_session_logs_stdout(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_stdout: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_stdout_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_stdout_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_stdout_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_stdout_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsStdout**](GwUpdateRemoteAccessSessionLogsStdout.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_sumologic + +> gw_update_remote_access_session_logs_sumologic(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsSumologic.new # GwUpdateRemoteAccessSessionLogsSumologic | + +begin + + result = api_instance.gw_update_remote_access_session_logs_sumologic(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_sumologic: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_sumologic_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_sumologic_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_sumologic_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_sumologic_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsSumologic**](GwUpdateRemoteAccessSessionLogsSumologic.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + +## gw_update_remote_access_session_logs_syslog + +> gw_update_remote_access_session_logs_syslog(body) + + + +### Examples + +```ruby +require 'time' +require 'akeyless' + +api_instance = Akeyless::V2Api.new +body = Akeyless::GwUpdateRemoteAccessSessionLogsSyslog.new # GwUpdateRemoteAccessSessionLogsSyslog | + +begin + + result = api_instance.gw_update_remote_access_session_logs_syslog(body) + p result +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_syslog: #{e}" +end +``` + +#### Using the gw_update_remote_access_session_logs_syslog_with_http_info variant + +This returns an Array which contains the response data, status code and headers. + +> , Integer, Hash)> gw_update_remote_access_session_logs_syslog_with_http_info(body) + +```ruby +begin + + data, status_code, headers = api_instance.gw_update_remote_access_session_logs_syslog_with_http_info(body) + p status_code # => 2xx + p headers # => { ... } + p data # => +rescue Akeyless::ApiError => e + puts "Error when calling V2Api->gw_update_remote_access_session_logs_syslog_with_http_info: #{e}" +end +``` + +### Parameters + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **body** | [**GwUpdateRemoteAccessSessionLogsSyslog**](GwUpdateRemoteAccessSessionLogsSyslog.md) | | | + +### Return type + +[**GatewayUpdateLogForwardingOutput**](GatewayUpdateLogForwardingOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + +- **Content-Type**: application/json +- **Accept**: application/json + + ## hmac > hmac(body) diff --git a/docs/WebBastionConf.md b/docs/WebBastionConf.md new file mode 100644 index 00000000..1bf0a903 --- /dev/null +++ b/docs/WebBastionConf.md @@ -0,0 +1,20 @@ +# Akeyless::WebBastionConf + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **guacamole** | [**WebBastionGuacamole**](WebBastionGuacamole.md) | | [optional] | +| **rdp_record** | [**WebBastionRdpRecord**](WebBastionRdpRecord.md) | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::WebBastionConf.new( + guacamole: null, + rdp_record: null +) +``` + diff --git a/docs/WebBastionGuacamole.md b/docs/WebBastionGuacamole.md new file mode 100644 index 00000000..bd120342 --- /dev/null +++ b/docs/WebBastionGuacamole.md @@ -0,0 +1,18 @@ +# Akeyless::WebBastionGuacamole + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **keyboard_layout** | **String** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::WebBastionGuacamole.new( + keyboard_layout: null +) +``` + diff --git a/docs/WebBastionRdpRecord.md b/docs/WebBastionRdpRecord.md new file mode 100644 index 00000000..aaf33f77 --- /dev/null +++ b/docs/WebBastionRdpRecord.md @@ -0,0 +1,22 @@ +# Akeyless::WebBastionRdpRecord + +## Properties + +| Name | Type | Description | Notes | +| ---- | ---- | ----------- | ----- | +| **aws** | [**AwsStorage**](AwsStorage.md) | | [optional] | +| **azure** | [**AzureStorage**](AzureStorage.md) | | [optional] | +| **storage_type** | **String** | | [optional] | + +## Example + +```ruby +require 'akeyless' + +instance = Akeyless::WebBastionRdpRecord.new( + aws: null, + azure: null, + storage_type: null +) +``` + diff --git a/lib/akeyless.rb b/lib/akeyless.rb index e5a43cea..aaca95f4 100644 --- a/lib/akeyless.rb +++ b/lib/akeyless.rb @@ -79,11 +79,15 @@ require 'akeyless/models/auth_method_update_universal_identity' require 'akeyless/models/auth_output' require 'akeyless/models/aws_s3_log_forwarding_config' +require 'akeyless/models/aws_storage' require 'akeyless/models/azure_ad_access_rules' require 'akeyless/models/azure_key_vault_migration' require 'akeyless/models/azure_log_analytics_forwarding_config' require 'akeyless/models/azure_payload' +require 'akeyless/models/azure_storage' require 'akeyless/models/azure_target_details' +require 'akeyless/models/bastion_config_reply_obj' +require 'akeyless/models/bastion_global_conf' require 'akeyless/models/bastion_list_entry' require 'akeyless/models/bastions_list' require 'akeyless/models/batch_encryption_request_line' @@ -466,6 +470,7 @@ require 'akeyless/models/gateway_get_log_forwarding' require 'akeyless/models/gateway_get_migration' require 'akeyless/models/gateway_get_producer' +require 'akeyless/models/gateway_get_remote_access' require 'akeyless/models/gateway_get_tmp_users' require 'akeyless/models/gateway_list_customer_fragments' require 'akeyless/models/gateway_list_migration' @@ -564,6 +569,8 @@ require 'akeyless/models/gateway_update_producer_snowflake_output' require 'akeyless/models/gateway_update_producer_venafi' require 'akeyless/models/gateway_update_producer_venafi_output' +require 'akeyless/models/gateway_update_remote_access' +require 'akeyless/models/gateway_update_remote_access_rdp_recordings' require 'akeyless/models/gateway_update_tls_cert' require 'akeyless/models/gateway_update_tls_cert_output' require 'akeyless/models/gateway_update_tmp_users' @@ -610,6 +617,17 @@ require 'akeyless/models/google_chronicle_forwarding_config' require 'akeyless/models/group' require 'akeyless/models/gw_cluster_identity' +require 'akeyless/models/gw_update_remote_access_session_logs_aws_s3' +require 'akeyless/models/gw_update_remote_access_session_logs_azure_analytics' +require 'akeyless/models/gw_update_remote_access_session_logs_datadog' +require 'akeyless/models/gw_update_remote_access_session_logs_elasticsearch' +require 'akeyless/models/gw_update_remote_access_session_logs_google_chronicle' +require 'akeyless/models/gw_update_remote_access_session_logs_logstash' +require 'akeyless/models/gw_update_remote_access_session_logs_logz_io' +require 'akeyless/models/gw_update_remote_access_session_logs_splunk' +require 'akeyless/models/gw_update_remote_access_session_logs_stdout' +require 'akeyless/models/gw_update_remote_access_session_logs_sumologic' +require 'akeyless/models/gw_update_remote_access_session_logs_syslog' require 'akeyless/models/hashi_migration' require 'akeyless/models/hashi_payload' require 'akeyless/models/hashi_vault_target_details' @@ -694,6 +712,7 @@ require 'akeyless/models/move_objects' require 'akeyless/models/name' require 'akeyless/models/native_k8s_target_details' +require 'akeyless/models/next_auto_rotation_event' require 'akeyless/models/noti_forwarder' require 'akeyless/models/o_auth2_access_rules' require 'akeyless/models/o_auth2_custom_claim' @@ -705,6 +724,7 @@ require 'akeyless/models/one_password_migration' require 'akeyless/models/one_password_payload' require 'akeyless/models/pki_certificate_issue_details' +require 'akeyless/models/password_expiration_info' require 'akeyless/models/password_policy_info' require 'akeyless/models/path_rule' require 'akeyless/models/ping_target_details' @@ -722,6 +742,8 @@ require 'akeyless/models/request_access' require 'akeyless/models/request_access_output' require 'akeyless/models/required_activity' +require 'akeyless/models/reset_access_key' +require 'akeyless/models/reset_auth_method_access_key_output' require 'akeyless/models/reverse_rbac' require 'akeyless/models/reverse_rbac_client' require 'akeyless/models/reverse_rbac_output' @@ -815,6 +837,8 @@ require 'akeyless/models/sm_info' require 'akeyless/models/splunk_log_forwarding_config' require 'akeyless/models/sra_info' +require 'akeyless/models/ssh_bastion_conf' +require 'akeyless/models/ssh_bastion_session_termination' require 'akeyless/models/static_creds_auth' require 'akeyless/models/static_creds_auth_output' require 'akeyless/models/static_secret_details_info' @@ -1023,6 +1047,9 @@ require 'akeyless/models/verify_pki_cert_output' require 'akeyless/models/verify_pki_cert_with_classic_key' require 'akeyless/models/verify_rsa_ssa_pss' +require 'akeyless/models/web_bastion_conf' +require 'akeyless/models/web_bastion_guacamole' +require 'akeyless/models/web_bastion_rdp_record' require 'akeyless/models/web_hook_noti_forwarder_public_details' require 'akeyless/models/web_target_details' require 'akeyless/models/windows_service' diff --git a/lib/akeyless/api/v2_api.rb b/lib/akeyless/api/v2_api.rb index 9e9d25c8..39f729a4 100644 --- a/lib/akeyless/api/v2_api.rb +++ b/lib/akeyless/api/v2_api.rb @@ -76,7 +76,7 @@ def alias_details_with_http_info(body, opts = {}) :return_type => return_type ) - data, status_code, headers = @api_client.call_api(:GET, local_var_path, new_options) + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) if @api_client.config.debugging @api_client.config.logger.debug "API called: V2Api#alias_details\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" end @@ -15495,6 +15495,70 @@ def gateway_get_producer_with_http_info(body, opts = {}) return data, status_code, headers end + # @param body [GatewayGetRemoteAccess] + # @param [Hash] opts the optional parameters + # @return [BastionConfigReplyObj] + def gateway_get_remote_access(body, opts = {}) + data, _status_code, _headers = gateway_get_remote_access_with_http_info(body, opts) + data + end + + # @param body [GatewayGetRemoteAccess] + # @param [Hash] opts the optional parameters + # @return [Array<(BastionConfigReplyObj, Integer, Hash)>] BastionConfigReplyObj data, response status code and response headers + def gateway_get_remote_access_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gateway_get_remote_access ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gateway_get_remote_access" + end + # resource path + local_var_path = '/gateway-get-remote-access' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'BastionConfigReplyObj' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gateway_get_remote_access", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gateway_get_remote_access\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + # @param body [GatewayGetTmpUsers] # @param [Hash] opts the optional parameters # @return [Array] @@ -19007,6 +19071,123 @@ def gateway_update_producer_venafi_with_http_info(body, opts = {}) return data, status_code, headers end + # @param [Hash] opts the optional parameters + # @return [Object] + def gateway_update_remote_access(opts = {}) + data, _status_code, _headers = gateway_update_remote_access_with_http_info(opts) + data + end + + # @param [Hash] opts the optional parameters + # @return [Array<(Object, Integer, Hash)>] Object data, response status code and response headers + def gateway_update_remote_access_with_http_info(opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gateway_update_remote_access ...' + end + # resource path + local_var_path = '/gateway-update-remote-access' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] + + # return_type + return_type = opts[:debug_return_type] || 'Object' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gateway_update_remote_access", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gateway_update_remote_access\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GatewayUpdateRemoteAccessRdpRecordings] + # @param [Hash] opts the optional parameters + # @return [Object] + def gateway_update_remote_access_rdp_recordings(body, opts = {}) + data, _status_code, _headers = gateway_update_remote_access_rdp_recordings_with_http_info(body, opts) + data + end + + # @param body [GatewayUpdateRemoteAccessRdpRecordings] + # @param [Hash] opts the optional parameters + # @return [Array<(Object, Integer, Hash)>] Object data, response status code and response headers + def gateway_update_remote_access_rdp_recordings_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gateway_update_remote_access_rdp_recordings ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gateway_update_remote_access_rdp_recordings" + end + # resource path + local_var_path = '/gateway-update-remote-access-rdp-recording' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'Object' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gateway_update_remote_access_rdp_recordings", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gateway_update_remote_access_rdp_recordings\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + # @param body [GatewayUpdateTlsCert] # @param [Hash] opts the optional parameters # @return [GatewayUpdateTlsCertOutput] @@ -20404,6 +20585,710 @@ def get_target_details_with_http_info(body, opts = {}) return data, status_code, headers end + # @param body [GwUpdateRemoteAccessSessionLogsAwsS3] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_aws_s3(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_aws_s3_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsAwsS3] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_aws_s3_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_aws_s3 ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_aws_s3" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-aws-s3' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_aws_s3", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_aws_s3\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsAzureAnalytics] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_azure_analytics(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_azure_analytics_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsAzureAnalytics] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_azure_analytics_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_azure_analytics ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_azure_analytics" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-azure-analytics' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_azure_analytics", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_azure_analytics\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsDatadog] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_datadog(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_datadog_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsDatadog] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_datadog_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_datadog ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_datadog" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-datadog' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_datadog", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_datadog\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsElasticsearch] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_elasticsearch(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_elasticsearch_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsElasticsearch] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_elasticsearch_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_elasticsearch ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_elasticsearch" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-elasticsearch' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_elasticsearch", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_elasticsearch\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsGoogleChronicle] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_google_chronicle(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_google_chronicle_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsGoogleChronicle] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_google_chronicle_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_google_chronicle ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_google_chronicle" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-google-chronicle' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_google_chronicle", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_google_chronicle\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsLogstash] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_logstash(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_logstash_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsLogstash] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_logstash_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_logstash ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_logstash" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-logstash' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_logstash", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_logstash\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsLogzIo] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_logz_io(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_logz_io_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsLogzIo] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_logz_io_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_logz_io ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_logz_io" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-logz-io' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_logz_io", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_logz_io\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsSplunk] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_splunk(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_splunk_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsSplunk] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_splunk_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_splunk ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_splunk" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-splunk' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_splunk", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_splunk\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsStdout] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_stdout(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_stdout_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsStdout] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_stdout_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_stdout ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_stdout" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-stdout' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_stdout", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_stdout\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsSumologic] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_sumologic(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_sumologic_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsSumologic] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_sumologic_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_sumologic ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_sumologic" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-sumologic' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_sumologic", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_sumologic\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + + # @param body [GwUpdateRemoteAccessSessionLogsSyslog] + # @param [Hash] opts the optional parameters + # @return [GatewayUpdateLogForwardingOutput] + def gw_update_remote_access_session_logs_syslog(body, opts = {}) + data, _status_code, _headers = gw_update_remote_access_session_logs_syslog_with_http_info(body, opts) + data + end + + # @param body [GwUpdateRemoteAccessSessionLogsSyslog] + # @param [Hash] opts the optional parameters + # @return [Array<(GatewayUpdateLogForwardingOutput, Integer, Hash)>] GatewayUpdateLogForwardingOutput data, response status code and response headers + def gw_update_remote_access_session_logs_syslog_with_http_info(body, opts = {}) + if @api_client.config.debugging + @api_client.config.logger.debug 'Calling API: V2Api.gw_update_remote_access_session_logs_syslog ...' + end + # verify the required parameter 'body' is set + if @api_client.config.client_side_validation && body.nil? + fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.gw_update_remote_access_session_logs_syslog" + end + # resource path + local_var_path = '/gateway-update-remote-access-session-forwarding-syslog' + + # query parameters + query_params = opts[:query_params] || {} + + # header parameters + header_params = opts[:header_params] || {} + # HTTP header 'Accept' (if needed) + header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept'] + # HTTP header 'Content-Type' + content_type = @api_client.select_header_content_type(['application/json']) + if !content_type.nil? + header_params['Content-Type'] = content_type + end + + # form parameters + form_params = opts[:form_params] || {} + + # http body (model) + post_body = opts[:debug_body] || @api_client.object_to_http_body(body) + + # return_type + return_type = opts[:debug_return_type] || 'GatewayUpdateLogForwardingOutput' + + # auth_names + auth_names = opts[:debug_auth_names] || [] + + new_options = opts.merge( + :operation => :"V2Api.gw_update_remote_access_session_logs_syslog", + :header_params => header_params, + :query_params => query_params, + :form_params => form_params, + :body => post_body, + :auth_names => auth_names, + :return_type => return_type + ) + + data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options) + if @api_client.config.debugging + @api_client.config.logger.debug "API called: V2Api#gw_update_remote_access_session_logs_syslog\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}" + end + return data, status_code, headers + end + # @param body [Hmac] # @param [Hash] opts the optional parameters # @return [HmacOutput] diff --git a/lib/akeyless/models/account_general_settings.rb b/lib/akeyless/models/account_general_settings.rb index 32499675..20e471b9 100644 --- a/lib/akeyless/models/account_general_settings.rb +++ b/lib/akeyless/models/account_general_settings.rb @@ -42,6 +42,8 @@ class AccountGeneralSettings # LockDefaultKey determines whether the configured default key can be updated by end-users on a per-request basis true - all requests use the configured default key false - every request can determine its protection key (default) nil - change nothing (every request can determine its protection key (default)) This parameter is only relevant if AccountDefaultKeyItemID is not empty attr_accessor :lock_default_key + attr_accessor :password_expiration_info + attr_accessor :password_policy attr_accessor :protect_items_by_default @@ -64,6 +66,7 @@ def self.attribute_map :'invalid_characters' => :'invalid_characters', :'item_usage_event' => :'item_usage_event', :'lock_default_key' => :'lock_default_key', + :'password_expiration_info' => :'password_expiration_info', :'password_policy' => :'password_policy', :'protect_items_by_default' => :'protect_items_by_default', :'rotation_secret_max_interval' => :'rotation_secret_max_interval', @@ -90,6 +93,7 @@ def self.openapi_types :'invalid_characters' => :'String', :'item_usage_event' => :'UsageEventSetting', :'lock_default_key' => :'Boolean', + :'password_expiration_info' => :'PasswordExpirationInfo', :'password_policy' => :'PasswordPolicyInfo', :'protect_items_by_default' => :'Boolean', :'rotation_secret_max_interval' => :'RotationSecretMaxInterval', @@ -162,6 +166,10 @@ def initialize(attributes = {}) self.lock_default_key = attributes[:'lock_default_key'] end + if attributes.key?(:'password_expiration_info') + self.password_expiration_info = attributes[:'password_expiration_info'] + end + if attributes.key?(:'password_policy') self.password_policy = attributes[:'password_policy'] end @@ -210,6 +218,7 @@ def ==(o) invalid_characters == o.invalid_characters && item_usage_event == o.item_usage_event && lock_default_key == o.lock_default_key && + password_expiration_info == o.password_expiration_info && password_policy == o.password_policy && protect_items_by_default == o.protect_items_by_default && rotation_secret_max_interval == o.rotation_secret_max_interval && @@ -225,7 +234,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [account_default_key_item_id, account_default_key_name, allowed_clients_ips, allowed_gateways_ips, auth_usage_event, data_protection_section, dynamic_secret_max_ttl, enable_request_for_access, invalid_characters, item_usage_event, lock_default_key, password_policy, protect_items_by_default, rotation_secret_max_interval, sharing_policy].hash + [account_default_key_item_id, account_default_key_name, allowed_clients_ips, allowed_gateways_ips, auth_usage_event, data_protection_section, dynamic_secret_max_ttl, enable_request_for_access, invalid_characters, item_usage_event, lock_default_key, password_expiration_info, password_policy, protect_items_by_default, rotation_secret_max_interval, sharing_policy].hash end # Builds the object from hash diff --git a/lib/akeyless/models/aws_storage.rb b/lib/akeyless/models/aws_storage.rb new file mode 100644 index 00000000..3738b61c --- /dev/null +++ b/lib/akeyless/models/aws_storage.rb @@ -0,0 +1,260 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class AwsStorage + # creds + attr_accessor :access_key_id + + attr_accessor :access_key_secret + + attr_accessor :auth_type + + attr_accessor :bucket + + attr_accessor :prefix + + attr_accessor :region + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'access_key_id' => :'access_key_id', + :'access_key_secret' => :'access_key_secret', + :'auth_type' => :'auth_type', + :'bucket' => :'bucket', + :'prefix' => :'prefix', + :'region' => :'region' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'access_key_id' => :'String', + :'access_key_secret' => :'String', + :'auth_type' => :'String', + :'bucket' => :'String', + :'prefix' => :'String', + :'region' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::AwsStorage` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::AwsStorage`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'access_key_id') + self.access_key_id = attributes[:'access_key_id'] + end + + if attributes.key?(:'access_key_secret') + self.access_key_secret = attributes[:'access_key_secret'] + end + + if attributes.key?(:'auth_type') + self.auth_type = attributes[:'auth_type'] + end + + if attributes.key?(:'bucket') + self.bucket = attributes[:'bucket'] + end + + if attributes.key?(:'prefix') + self.prefix = attributes[:'prefix'] + end + + if attributes.key?(:'region') + self.region = attributes[:'region'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + access_key_id == o.access_key_id && + access_key_secret == o.access_key_secret && + auth_type == o.auth_type && + bucket == o.bucket && + prefix == o.prefix && + region == o.region + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [access_key_id, access_key_secret, auth_type, bucket, prefix, region].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/azure_storage.rb b/lib/akeyless/models/azure_storage.rb new file mode 100644 index 00000000..7814b62e --- /dev/null +++ b/lib/akeyless/models/azure_storage.rb @@ -0,0 +1,260 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class AzureStorage + attr_accessor :auth_type + + attr_accessor :client_id + + attr_accessor :client_secret + + attr_accessor :storage_account + + attr_accessor :storage_container_name + + # creds + attr_accessor :tenant_id + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'auth_type' => :'auth_type', + :'client_id' => :'client_id', + :'client_secret' => :'client_secret', + :'storage_account' => :'storage_account', + :'storage_container_name' => :'storage_container_name', + :'tenant_id' => :'tenant_id' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'auth_type' => :'String', + :'client_id' => :'String', + :'client_secret' => :'String', + :'storage_account' => :'String', + :'storage_container_name' => :'String', + :'tenant_id' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::AzureStorage` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::AzureStorage`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'auth_type') + self.auth_type = attributes[:'auth_type'] + end + + if attributes.key?(:'client_id') + self.client_id = attributes[:'client_id'] + end + + if attributes.key?(:'client_secret') + self.client_secret = attributes[:'client_secret'] + end + + if attributes.key?(:'storage_account') + self.storage_account = attributes[:'storage_account'] + end + + if attributes.key?(:'storage_container_name') + self.storage_container_name = attributes[:'storage_container_name'] + end + + if attributes.key?(:'tenant_id') + self.tenant_id = attributes[:'tenant_id'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + auth_type == o.auth_type && + client_id == o.client_id && + client_secret == o.client_secret && + storage_account == o.storage_account && + storage_container_name == o.storage_container_name && + tenant_id == o.tenant_id + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [auth_type, client_id, client_secret, storage_account, storage_container_name, tenant_id].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/bastion_config_reply_obj.rb b/lib/akeyless/models/bastion_config_reply_obj.rb new file mode 100644 index 00000000..2ec7695f --- /dev/null +++ b/lib/akeyless/models/bastion_config_reply_obj.rb @@ -0,0 +1,259 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class BastionConfigReplyObj + attr_accessor :api_gateway_url + + attr_accessor :cluster_id + + attr_accessor :gator_cluster_id + + attr_accessor :global + + attr_accessor :ssh_bastion + + attr_accessor :web_bastion + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'api_gateway_url' => :'api_gateway_url', + :'cluster_id' => :'cluster_id', + :'gator_cluster_id' => :'gator_cluster_id', + :'global' => :'global', + :'ssh_bastion' => :'ssh_bastion', + :'web_bastion' => :'web_bastion' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'api_gateway_url' => :'String', + :'cluster_id' => :'String', + :'gator_cluster_id' => :'Integer', + :'global' => :'BastionGlobalConf', + :'ssh_bastion' => :'SshBastionConf', + :'web_bastion' => :'WebBastionConf' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::BastionConfigReplyObj` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::BastionConfigReplyObj`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'api_gateway_url') + self.api_gateway_url = attributes[:'api_gateway_url'] + end + + if attributes.key?(:'cluster_id') + self.cluster_id = attributes[:'cluster_id'] + end + + if attributes.key?(:'gator_cluster_id') + self.gator_cluster_id = attributes[:'gator_cluster_id'] + end + + if attributes.key?(:'global') + self.global = attributes[:'global'] + end + + if attributes.key?(:'ssh_bastion') + self.ssh_bastion = attributes[:'ssh_bastion'] + end + + if attributes.key?(:'web_bastion') + self.web_bastion = attributes[:'web_bastion'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + api_gateway_url == o.api_gateway_url && + cluster_id == o.cluster_id && + gator_cluster_id == o.gator_cluster_id && + global == o.global && + ssh_bastion == o.ssh_bastion && + web_bastion == o.web_bastion + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [api_gateway_url, cluster_id, gator_cluster_id, global, ssh_bastion, web_bastion].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/bastion_global_conf.rb b/lib/akeyless/models/bastion_global_conf.rb new file mode 100644 index 00000000..e65fe266 --- /dev/null +++ b/lib/akeyless/models/bastion_global_conf.rb @@ -0,0 +1,243 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class BastionGlobalConf + attr_accessor :allowed_bastion_urls + + attr_accessor :legacy_signing_alg + + attr_accessor :rdp_username_sub_claim + + attr_accessor :ssh_username_sub_claim + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'allowed_bastion_urls' => :'allowed_bastion_urls', + :'legacy_signing_alg' => :'legacy_signing_alg', + :'rdp_username_sub_claim' => :'rdp_username_sub_claim', + :'ssh_username_sub_claim' => :'ssh_username_sub_claim' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'allowed_bastion_urls' => :'Array', + :'legacy_signing_alg' => :'Boolean', + :'rdp_username_sub_claim' => :'String', + :'ssh_username_sub_claim' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::BastionGlobalConf` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::BastionGlobalConf`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'allowed_bastion_urls') + if (value = attributes[:'allowed_bastion_urls']).is_a?(Array) + self.allowed_bastion_urls = value + end + end + + if attributes.key?(:'legacy_signing_alg') + self.legacy_signing_alg = attributes[:'legacy_signing_alg'] + end + + if attributes.key?(:'rdp_username_sub_claim') + self.rdp_username_sub_claim = attributes[:'rdp_username_sub_claim'] + end + + if attributes.key?(:'ssh_username_sub_claim') + self.ssh_username_sub_claim = attributes[:'ssh_username_sub_claim'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + allowed_bastion_urls == o.allowed_bastion_urls && + legacy_signing_alg == o.legacy_signing_alg && + rdp_username_sub_claim == o.rdp_username_sub_claim && + ssh_username_sub_claim == o.ssh_username_sub_claim + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [allowed_bastion_urls, legacy_signing_alg, rdp_username_sub_claim, ssh_username_sub_claim].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/configure.rb b/lib/akeyless/models/configure.rb index 60da98e9..d8911db2 100644 --- a/lib/akeyless/models/configure.rb +++ b/lib/akeyless/models/configure.rb @@ -39,6 +39,15 @@ class Configure # Certificate data encoded in base64. Used if file was not provided. (relevant only for access-type=cert in Curl Context) attr_accessor :cert_data + # Certificate Issuer Name + attr_accessor :cert_issuer_name + + # The username to sign in the SSH certificate (use a comma-separated list for more than one username) + attr_accessor :cert_username + + # Default path prefix for name of items, targets and auth methods + attr_accessor :default_location_prefix + # GCP JWT audience attr_accessor :gcp_audience @@ -51,6 +60,9 @@ class Configure # Private key data encoded in base64. Used if file was not provided.(relevant only for access-type=cert in Curl Context) attr_accessor :key_data + # Set this option to output legacy ('ssh-rsa-cert-v01@openssh.com') signing algorithm name in the certificate. + attr_accessor :legacy_signing_alg_name + # The type of the OCI configuration to use [instance/apikey/resource] (relevant only for access-type=oci) attr_accessor :oci_auth_type @@ -68,10 +80,14 @@ def self.attribute_map :'admin_password' => :'admin-password', :'azure_ad_object_id' => :'azure_ad_object_id', :'cert_data' => :'cert-data', + :'cert_issuer_name' => :'cert-issuer-name', + :'cert_username' => :'cert-username', + :'default_location_prefix' => :'default-location-prefix', :'gcp_audience' => :'gcp-audience', :'json' => :'json', :'k8s_auth_config_name' => :'k8s-auth-config-name', :'key_data' => :'key-data', + :'legacy_signing_alg_name' => :'legacy-signing-alg-name', :'oci_auth_type' => :'oci-auth-type', :'oci_group_ocid' => :'oci-group-ocid' } @@ -93,10 +109,14 @@ def self.openapi_types :'admin_password' => :'String', :'azure_ad_object_id' => :'String', :'cert_data' => :'String', + :'cert_issuer_name' => :'String', + :'cert_username' => :'String', + :'default_location_prefix' => :'String', :'gcp_audience' => :'String', :'json' => :'Boolean', :'k8s_auth_config_name' => :'String', :'key_data' => :'String', + :'legacy_signing_alg_name' => :'Boolean', :'oci_auth_type' => :'String', :'oci_group_ocid' => :'Array' } @@ -157,6 +177,18 @@ def initialize(attributes = {}) self.cert_data = attributes[:'cert_data'] end + if attributes.key?(:'cert_issuer_name') + self.cert_issuer_name = attributes[:'cert_issuer_name'] + end + + if attributes.key?(:'cert_username') + self.cert_username = attributes[:'cert_username'] + end + + if attributes.key?(:'default_location_prefix') + self.default_location_prefix = attributes[:'default_location_prefix'] + end + if attributes.key?(:'gcp_audience') self.gcp_audience = attributes[:'gcp_audience'] else @@ -177,6 +209,10 @@ def initialize(attributes = {}) self.key_data = attributes[:'key_data'] end + if attributes.key?(:'legacy_signing_alg_name') + self.legacy_signing_alg_name = attributes[:'legacy_signing_alg_name'] + end + if attributes.key?(:'oci_auth_type') self.oci_auth_type = attributes[:'oci_auth_type'] else @@ -218,10 +254,14 @@ def ==(o) admin_password == o.admin_password && azure_ad_object_id == o.azure_ad_object_id && cert_data == o.cert_data && + cert_issuer_name == o.cert_issuer_name && + cert_username == o.cert_username && + default_location_prefix == o.default_location_prefix && gcp_audience == o.gcp_audience && json == o.json && k8s_auth_config_name == o.k8s_auth_config_name && key_data == o.key_data && + legacy_signing_alg_name == o.legacy_signing_alg_name && oci_auth_type == o.oci_auth_type && oci_group_ocid == o.oci_group_ocid end @@ -235,7 +275,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [access_id, access_key, access_type, account_id, admin_email, admin_password, azure_ad_object_id, cert_data, gcp_audience, json, k8s_auth_config_name, key_data, oci_auth_type, oci_group_ocid].hash + [access_id, access_key, access_type, account_id, admin_email, admin_password, azure_ad_object_id, cert_data, cert_issuer_name, cert_username, default_location_prefix, gcp_audience, json, k8s_auth_config_name, key_data, legacy_signing_alg_name, oci_auth_type, oci_group_ocid].hash end # Builds the object from hash diff --git a/lib/akeyless/models/connect.rb b/lib/akeyless/models/connect.rb index d6d6f315..cbe9ec6e 100644 --- a/lib/akeyless/models/connect.rb +++ b/lib/akeyless/models/connect.rb @@ -16,9 +16,6 @@ module Akeyless # Connect is a command that performs secure remote access class Connect - # todo - enable when gw-sra unification is done The Gateway URL (configuration management) address, e.g. http://localhost:8000 - attr_accessor :bastion_gateway_url - attr_accessor :helper # used to override .akeyless-connect.rc in tests @@ -39,6 +36,9 @@ class Connect # The Akeyless certificate issuer name attr_accessor :cert_issuer_name + # The Gateway URL (configuration management) address, e.g. http://localhost:8000 + attr_accessor :gateway_url + # The file from which the identity (private key) for public key authentication is read attr_accessor :identity_file @@ -77,7 +77,6 @@ class Connect # Attribute mapping from ruby-style variable name to JSON key. def self.attribute_map { - :'bastion_gateway_url' => :'BastionGatewayUrl', :'helper' => :'Helper', :'rc_file_override' => :'RcFileOverride', :'bastion_ctrl_path' => :'bastion-ctrl-path', @@ -85,6 +84,7 @@ def self.attribute_map :'bastion_ctrl_proto' => :'bastion-ctrl-proto', :'bastion_ctrl_subdomain' => :'bastion-ctrl-subdomain', :'cert_issuer_name' => :'cert-issuer-name', + :'gateway_url' => :'gateway-url', :'identity_file' => :'identity-file', :'json' => :'json', :'justification' => :'justification', @@ -108,7 +108,6 @@ def self.acceptable_attributes # Attribute type mapping. def self.openapi_types { - :'bastion_gateway_url' => :'String', :'helper' => :'Object', :'rc_file_override' => :'String', :'bastion_ctrl_path' => :'String', @@ -116,6 +115,7 @@ def self.openapi_types :'bastion_ctrl_proto' => :'String', :'bastion_ctrl_subdomain' => :'String', :'cert_issuer_name' => :'String', + :'gateway_url' => :'String', :'identity_file' => :'String', :'json' => :'Boolean', :'justification' => :'String', @@ -152,10 +152,6 @@ def initialize(attributes = {}) h[k.to_sym] = v } - if attributes.key?(:'bastion_gateway_url') - self.bastion_gateway_url = attributes[:'bastion_gateway_url'] - end - if attributes.key?(:'helper') self.helper = attributes[:'helper'] end @@ -188,6 +184,10 @@ def initialize(attributes = {}) self.cert_issuer_name = attributes[:'cert_issuer_name'] end + if attributes.key?(:'gateway_url') + self.gateway_url = attributes[:'gateway_url'] + end + if attributes.key?(:'identity_file') self.identity_file = attributes[:'identity_file'] end @@ -261,7 +261,6 @@ def valid? def ==(o) return true if self.equal?(o) self.class == o.class && - bastion_gateway_url == o.bastion_gateway_url && helper == o.helper && rc_file_override == o.rc_file_override && bastion_ctrl_path == o.bastion_ctrl_path && @@ -269,6 +268,7 @@ def ==(o) bastion_ctrl_proto == o.bastion_ctrl_proto && bastion_ctrl_subdomain == o.bastion_ctrl_subdomain && cert_issuer_name == o.cert_issuer_name && + gateway_url == o.gateway_url && identity_file == o.identity_file && json == o.json && justification == o.justification && @@ -292,7 +292,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [bastion_gateway_url, helper, rc_file_override, bastion_ctrl_path, bastion_ctrl_port, bastion_ctrl_proto, bastion_ctrl_subdomain, cert_issuer_name, identity_file, json, justification, name, ssh_command, ssh_extra_args, ssh_legacy_signing_alg, target, token, uid_token, use_ssh_agent, via_bastion].hash + [helper, rc_file_override, bastion_ctrl_path, bastion_ctrl_port, bastion_ctrl_proto, bastion_ctrl_subdomain, cert_issuer_name, gateway_url, identity_file, json, justification, name, ssh_command, ssh_extra_args, ssh_legacy_signing_alg, target, token, uid_token, use_ssh_agent, via_bastion].hash end # Builds the object from hash diff --git a/lib/akeyless/models/create_classic_key.rb b/lib/akeyless/models/create_classic_key.rb index 3a59a4dd..875ec05f 100644 --- a/lib/akeyless/models/create_classic_key.rb +++ b/lib/akeyless/models/create_classic_key.rb @@ -19,6 +19,9 @@ class CreateClassicKey # Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] attr_accessor :alg + # Whether to automatically rotate every rotation_interval days, or disable existing automatic rotation [true/false] + attr_accessor :auto_rotate + # Certificate in a PEM format. attr_accessor :cert_file_data @@ -54,6 +57,9 @@ class CreateClassicKey # Description of the object attr_accessor :description + # How many days before the expiration of the certificate would you like to be notified. + attr_accessor :expiration_event_in + # Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. attr_accessor :generate_self_signed_certificate @@ -75,6 +81,12 @@ class CreateClassicKey # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) attr_accessor :protection_key_name + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + + # The number of days to wait between every automatic rotation (1-365) + attr_accessor :rotation_interval + # Add tags attached to this object attr_accessor :tags @@ -88,6 +100,7 @@ class CreateClassicKey def self.attribute_map { :'alg' => :'alg', + :'auto_rotate' => :'auto-rotate', :'cert_file_data' => :'cert-file-data', :'certificate_common_name' => :'certificate-common-name', :'certificate_country' => :'certificate-country', @@ -100,6 +113,7 @@ def self.attribute_map :'conf_file_data' => :'conf-file-data', :'delete_protection' => :'delete_protection', :'description' => :'description', + :'expiration_event_in' => :'expiration-event-in', :'generate_self_signed_certificate' => :'generate-self-signed-certificate', :'gpg_alg' => :'gpg-alg', :'json' => :'json', @@ -107,6 +121,8 @@ def self.attribute_map :'metadata' => :'metadata', :'name' => :'name', :'protection_key_name' => :'protection-key-name', + :'rotation_event_in' => :'rotation-event-in', + :'rotation_interval' => :'rotation-interval', :'tags' => :'tags', :'token' => :'token', :'uid_token' => :'uid-token' @@ -122,6 +138,7 @@ def self.acceptable_attributes def self.openapi_types { :'alg' => :'String', + :'auto_rotate' => :'String', :'cert_file_data' => :'String', :'certificate_common_name' => :'String', :'certificate_country' => :'String', @@ -134,6 +151,7 @@ def self.openapi_types :'conf_file_data' => :'String', :'delete_protection' => :'String', :'description' => :'String', + :'expiration_event_in' => :'Array', :'generate_self_signed_certificate' => :'Boolean', :'gpg_alg' => :'String', :'json' => :'Boolean', @@ -141,6 +159,8 @@ def self.openapi_types :'metadata' => :'String', :'name' => :'String', :'protection_key_name' => :'String', + :'rotation_event_in' => :'Array', + :'rotation_interval' => :'String', :'tags' => :'Array', :'token' => :'String', :'uid_token' => :'String' @@ -174,6 +194,10 @@ def initialize(attributes = {}) self.alg = nil end + if attributes.key?(:'auto_rotate') + self.auto_rotate = attributes[:'auto_rotate'] + end + if attributes.key?(:'cert_file_data') self.cert_file_data = attributes[:'cert_file_data'] end @@ -222,6 +246,12 @@ def initialize(attributes = {}) self.description = attributes[:'description'] end + if attributes.key?(:'expiration_event_in') + if (value = attributes[:'expiration_event_in']).is_a?(Array) + self.expiration_event_in = value + end + end + if attributes.key?(:'generate_self_signed_certificate') self.generate_self_signed_certificate = attributes[:'generate_self_signed_certificate'] end @@ -254,6 +284,16 @@ def initialize(attributes = {}) self.protection_key_name = attributes[:'protection_key_name'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + + if attributes.key?(:'rotation_interval') + self.rotation_interval = attributes[:'rotation_interval'] + end + if attributes.key?(:'tags') if (value = attributes[:'tags']).is_a?(Array) self.tags = value @@ -300,6 +340,7 @@ def ==(o) return true if self.equal?(o) self.class == o.class && alg == o.alg && + auto_rotate == o.auto_rotate && cert_file_data == o.cert_file_data && certificate_common_name == o.certificate_common_name && certificate_country == o.certificate_country && @@ -312,6 +353,7 @@ def ==(o) conf_file_data == o.conf_file_data && delete_protection == o.delete_protection && description == o.description && + expiration_event_in == o.expiration_event_in && generate_self_signed_certificate == o.generate_self_signed_certificate && gpg_alg == o.gpg_alg && json == o.json && @@ -319,6 +361,8 @@ def ==(o) metadata == o.metadata && name == o.name && protection_key_name == o.protection_key_name && + rotation_event_in == o.rotation_event_in && + rotation_interval == o.rotation_interval && tags == o.tags && token == o.token && uid_token == o.uid_token @@ -333,7 +377,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [alg, cert_file_data, certificate_common_name, certificate_country, certificate_digest_algo, certificate_format, certificate_locality, certificate_organization, certificate_province, certificate_ttl, conf_file_data, delete_protection, description, generate_self_signed_certificate, gpg_alg, json, key_data, metadata, name, protection_key_name, tags, token, uid_token].hash + [alg, auto_rotate, cert_file_data, certificate_common_name, certificate_country, certificate_digest_algo, certificate_format, certificate_locality, certificate_organization, certificate_province, certificate_ttl, conf_file_data, delete_protection, description, expiration_event_in, generate_self_signed_certificate, gpg_alg, json, key_data, metadata, name, protection_key_name, rotation_event_in, rotation_interval, tags, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/create_dfc_key.rb b/lib/akeyless/models/create_dfc_key.rb index 1f2df3e4..cd9f02de 100644 --- a/lib/akeyless/models/create_dfc_key.rb +++ b/lib/akeyless/models/create_dfc_key.rb @@ -18,6 +18,9 @@ class CreateDFCKey # DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] attr_accessor :alg + # Whether to automatically rotate every rotation_interval days, or disable existing automatic rotation [true/false] + attr_accessor :auto_rotate + # Common name for the generated certificate. Relevant only for generate-self-signed-certificate. attr_accessor :certificate_common_name @@ -53,6 +56,9 @@ class CreateDFCKey # Description of the object attr_accessor :description + # How many days before the expiration of the certificate would you like to be notified. + attr_accessor :expiration_event_in + # Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. attr_accessor :generate_self_signed_certificate @@ -65,6 +71,12 @@ class CreateDFCKey # DFCKey name attr_accessor :name + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + + # The number of days to wait between every automatic rotation (7-365) + attr_accessor :rotation_interval + # The number of fragments that the item will be split into (not includes customer fragment) attr_accessor :split_level @@ -81,6 +93,7 @@ class CreateDFCKey def self.attribute_map { :'alg' => :'alg', + :'auto_rotate' => :'auto-rotate', :'certificate_common_name' => :'certificate-common-name', :'certificate_country' => :'certificate-country', :'certificate_digest_algo' => :'certificate-digest-algo', @@ -93,10 +106,13 @@ def self.attribute_map :'customer_frg_id' => :'customer-frg-id', :'delete_protection' => :'delete_protection', :'description' => :'description', + :'expiration_event_in' => :'expiration-event-in', :'generate_self_signed_certificate' => :'generate-self-signed-certificate', :'json' => :'json', :'metadata' => :'metadata', :'name' => :'name', + :'rotation_event_in' => :'rotation-event-in', + :'rotation_interval' => :'rotation-interval', :'split_level' => :'split-level', :'tag' => :'tag', :'token' => :'token', @@ -113,6 +129,7 @@ def self.acceptable_attributes def self.openapi_types { :'alg' => :'String', + :'auto_rotate' => :'String', :'certificate_common_name' => :'String', :'certificate_country' => :'String', :'certificate_digest_algo' => :'String', @@ -125,10 +142,13 @@ def self.openapi_types :'customer_frg_id' => :'String', :'delete_protection' => :'String', :'description' => :'String', + :'expiration_event_in' => :'Array', :'generate_self_signed_certificate' => :'Boolean', :'json' => :'Boolean', :'metadata' => :'String', :'name' => :'String', + :'rotation_event_in' => :'Array', + :'rotation_interval' => :'String', :'split_level' => :'Integer', :'tag' => :'Array', :'token' => :'String', @@ -163,6 +183,10 @@ def initialize(attributes = {}) self.alg = nil end + if attributes.key?(:'auto_rotate') + self.auto_rotate = attributes[:'auto_rotate'] + end + if attributes.key?(:'certificate_common_name') self.certificate_common_name = attributes[:'certificate_common_name'] end @@ -211,6 +235,12 @@ def initialize(attributes = {}) self.description = attributes[:'description'] end + if attributes.key?(:'expiration_event_in') + if (value = attributes[:'expiration_event_in']).is_a?(Array) + self.expiration_event_in = value + end + end + if attributes.key?(:'generate_self_signed_certificate') self.generate_self_signed_certificate = attributes[:'generate_self_signed_certificate'] end @@ -231,6 +261,16 @@ def initialize(attributes = {}) self.name = nil end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + + if attributes.key?(:'rotation_interval') + self.rotation_interval = attributes[:'rotation_interval'] + end + if attributes.key?(:'split_level') self.split_level = attributes[:'split_level'] else @@ -283,6 +323,7 @@ def ==(o) return true if self.equal?(o) self.class == o.class && alg == o.alg && + auto_rotate == o.auto_rotate && certificate_common_name == o.certificate_common_name && certificate_country == o.certificate_country && certificate_digest_algo == o.certificate_digest_algo && @@ -295,10 +336,13 @@ def ==(o) customer_frg_id == o.customer_frg_id && delete_protection == o.delete_protection && description == o.description && + expiration_event_in == o.expiration_event_in && generate_self_signed_certificate == o.generate_self_signed_certificate && json == o.json && metadata == o.metadata && name == o.name && + rotation_event_in == o.rotation_event_in && + rotation_interval == o.rotation_interval && split_level == o.split_level && tag == o.tag && token == o.token && @@ -314,7 +358,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [alg, certificate_common_name, certificate_country, certificate_digest_algo, certificate_format, certificate_locality, certificate_organization, certificate_province, certificate_ttl, conf_file_data, customer_frg_id, delete_protection, description, generate_self_signed_certificate, json, metadata, name, split_level, tag, token, uid_token].hash + [alg, auto_rotate, certificate_common_name, certificate_country, certificate_digest_algo, certificate_format, certificate_locality, certificate_organization, certificate_province, certificate_ttl, conf_file_data, customer_frg_id, delete_protection, description, expiration_event_in, generate_self_signed_certificate, json, metadata, name, rotation_event_in, rotation_interval, split_level, tag, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/dynamic_secret_update_artifactory.rb b/lib/akeyless/models/dynamic_secret_update_artifactory.rb index 1dc7d25e..30cfdda2 100644 --- a/lib/akeyless/models/dynamic_secret_update_artifactory.rb +++ b/lib/akeyless/models/dynamic_secret_update_artifactory.rb @@ -43,7 +43,7 @@ class DynamicSecretUpdateArtifactory # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_aws.rb b/lib/akeyless/models/dynamic_secret_update_aws.rb index e9fd5805..84f855bf 100644 --- a/lib/akeyless/models/dynamic_secret_update_aws.rb +++ b/lib/akeyless/models/dynamic_secret_update_aws.rb @@ -57,7 +57,7 @@ class DynamicSecretUpdateAws # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_azure.rb b/lib/akeyless/models/dynamic_secret_update_azure.rb index 0daec3fd..9ded8cfb 100644 --- a/lib/akeyless/models/dynamic_secret_update_azure.rb +++ b/lib/akeyless/models/dynamic_secret_update_azure.rb @@ -46,7 +46,7 @@ class DynamicSecretUpdateAzure # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_cassandra.rb b/lib/akeyless/models/dynamic_secret_update_cassandra.rb index 86dee678..d3f26abc 100644 --- a/lib/akeyless/models/dynamic_secret_update_cassandra.rb +++ b/lib/akeyless/models/dynamic_secret_update_cassandra.rb @@ -43,7 +43,7 @@ class DynamicSecretUpdateCassandra # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_chef.rb b/lib/akeyless/models/dynamic_secret_update_chef.rb index dd4206f7..3a34e482 100644 --- a/lib/akeyless/models/dynamic_secret_update_chef.rb +++ b/lib/akeyless/models/dynamic_secret_update_chef.rb @@ -40,7 +40,7 @@ class DynamicSecretUpdateChef # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_custom.rb b/lib/akeyless/models/dynamic_secret_update_custom.rb index 720c8e27..05715f17 100644 --- a/lib/akeyless/models/dynamic_secret_update_custom.rb +++ b/lib/akeyless/models/dynamic_secret_update_custom.rb @@ -36,7 +36,7 @@ class DynamicSecretUpdateCustom # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Secret payload to be sent with each create/revoke webhook request diff --git a/lib/akeyless/models/dynamic_secret_update_dockerhub.rb b/lib/akeyless/models/dynamic_secret_update_dockerhub.rb index 3a6a8c39..a0fa8cca 100644 --- a/lib/akeyless/models/dynamic_secret_update_dockerhub.rb +++ b/lib/akeyless/models/dynamic_secret_update_dockerhub.rb @@ -37,7 +37,7 @@ class DynamicSecretUpdateDockerhub # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_eks.rb b/lib/akeyless/models/dynamic_secret_update_eks.rb index 7c84057c..61abd8ab 100644 --- a/lib/akeyless/models/dynamic_secret_update_eks.rb +++ b/lib/akeyless/models/dynamic_secret_update_eks.rb @@ -49,7 +49,7 @@ class DynamicSecretUpdateEks # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_gcp.rb b/lib/akeyless/models/dynamic_secret_update_gcp.rb index 118945e5..a5df4af6 100644 --- a/lib/akeyless/models/dynamic_secret_update_gcp.rb +++ b/lib/akeyless/models/dynamic_secret_update_gcp.rb @@ -42,7 +42,7 @@ class DynamicSecretUpdateGcp # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_github.rb b/lib/akeyless/models/dynamic_secret_update_github.rb index e267eaeb..273dde4c 100644 --- a/lib/akeyless/models/dynamic_secret_update_github.rb +++ b/lib/akeyless/models/dynamic_secret_update_github.rb @@ -46,7 +46,7 @@ class DynamicSecretUpdateGithub # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Add tags attached to this object diff --git a/lib/akeyless/models/dynamic_secret_update_gitlab.rb b/lib/akeyless/models/dynamic_secret_update_gitlab.rb index 230f292d..e1ff914b 100644 --- a/lib/akeyless/models/dynamic_secret_update_gitlab.rb +++ b/lib/akeyless/models/dynamic_secret_update_gitlab.rb @@ -52,7 +52,7 @@ class DynamicSecretUpdateGitlab # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Add tags attached to this object diff --git a/lib/akeyless/models/dynamic_secret_update_gke.rb b/lib/akeyless/models/dynamic_secret_update_gke.rb index f5547dd6..c5b6928f 100644 --- a/lib/akeyless/models/dynamic_secret_update_gke.rb +++ b/lib/akeyless/models/dynamic_secret_update_gke.rb @@ -43,7 +43,7 @@ class DynamicSecretUpdateGke # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_google_workspace.rb b/lib/akeyless/models/dynamic_secret_update_google_workspace.rb index 97539271..90d46ded 100644 --- a/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +++ b/lib/akeyless/models/dynamic_secret_update_google_workspace.rb @@ -41,7 +41,7 @@ class DynamicSecretUpdateGoogleWorkspace # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_hana_db.rb b/lib/akeyless/models/dynamic_secret_update_hana_db.rb index f06ede50..bd93471f 100644 --- a/lib/akeyless/models/dynamic_secret_update_hana_db.rb +++ b/lib/akeyless/models/dynamic_secret_update_hana_db.rb @@ -49,7 +49,7 @@ class DynamicSecretUpdateHanaDb # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_k8s.rb b/lib/akeyless/models/dynamic_secret_update_k8s.rb index 777ef181..0891c11c 100644 --- a/lib/akeyless/models/dynamic_secret_update_k8s.rb +++ b/lib/akeyless/models/dynamic_secret_update_k8s.rb @@ -61,7 +61,7 @@ class DynamicSecretUpdateK8s # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/dynamic_secret_update_ldap.rb b/lib/akeyless/models/dynamic_secret_update_ldap.rb index 5777c7c8..ae47c92e 100644 --- a/lib/akeyless/models/dynamic_secret_update_ldap.rb +++ b/lib/akeyless/models/dynamic_secret_update_ldap.rb @@ -51,7 +51,7 @@ class DynamicSecretUpdateLdap # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_mongo_db.rb b/lib/akeyless/models/dynamic_secret_update_mongo_db.rb index ae6da667..4b31ba20 100644 --- a/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +++ b/lib/akeyless/models/dynamic_secret_update_mongo_db.rb @@ -64,7 +64,7 @@ class DynamicSecretUpdateMongoDb # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_ms_sql.rb b/lib/akeyless/models/dynamic_secret_update_ms_sql.rb index b3b06c00..cdcd7edd 100644 --- a/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +++ b/lib/akeyless/models/dynamic_secret_update_ms_sql.rb @@ -49,7 +49,7 @@ class DynamicSecretUpdateMsSql # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_my_sql.rb b/lib/akeyless/models/dynamic_secret_update_my_sql.rb index 04dfd96b..9dc91aa7 100644 --- a/lib/akeyless/models/dynamic_secret_update_my_sql.rb +++ b/lib/akeyless/models/dynamic_secret_update_my_sql.rb @@ -55,7 +55,7 @@ class DynamicSecretUpdateMySql # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # The length of the password to be generated diff --git a/lib/akeyless/models/dynamic_secret_update_oracle_db.rb b/lib/akeyless/models/dynamic_secret_update_oracle_db.rb index 24dce3f9..89592f38 100644 --- a/lib/akeyless/models/dynamic_secret_update_oracle_db.rb +++ b/lib/akeyless/models/dynamic_secret_update_oracle_db.rb @@ -34,7 +34,7 @@ class DynamicSecretUpdateOracleDb # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Oracle Host diff --git a/lib/akeyless/models/dynamic_secret_update_ping.rb b/lib/akeyless/models/dynamic_secret_update_ping.rb index 7ee33f9d..93c64700 100644 --- a/lib/akeyless/models/dynamic_secret_update_ping.rb +++ b/lib/akeyless/models/dynamic_secret_update_ping.rb @@ -28,7 +28,7 @@ class DynamicSecretUpdatePing # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Ping Federate administrative port diff --git a/lib/akeyless/models/dynamic_secret_update_venafi.rb b/lib/akeyless/models/dynamic_secret_update_venafi.rb index 47af334a..cef16deb 100644 --- a/lib/akeyless/models/dynamic_secret_update_venafi.rb +++ b/lib/akeyless/models/dynamic_secret_update_venafi.rb @@ -43,7 +43,7 @@ class DynamicSecretUpdateVenafi # Dynamic secret name attr_accessor :name - # Dynamic secret new name + # Dynamic secret name attr_accessor :new_name # Dynamic producer encryption key diff --git a/lib/akeyless/models/email_pass_access_rules.rb b/lib/akeyless/models/email_pass_access_rules.rb index 96e8e6fd..9cf27fbd 100644 --- a/lib/akeyless/models/email_pass_access_rules.rb +++ b/lib/akeyless/models/email_pass_access_rules.rb @@ -26,13 +26,17 @@ class EmailPassAccessRules # The password value attr_accessor :hash_pass + # The last password change date + attr_accessor :last_reset_password + # Attribute mapping from ruby-style variable name to JSON key. def self.attribute_map { :'alg' => :'alg', :'email' => :'email', :'enc_email_with_shared_key' => :'enc_email_with_shared_key', - :'hash_pass' => :'hash_pass' + :'hash_pass' => :'hash_pass', + :'last_reset_password' => :'last_reset_password' } end @@ -47,7 +51,8 @@ def self.openapi_types :'alg' => :'String', :'email' => :'String', :'enc_email_with_shared_key' => :'String', - :'hash_pass' => :'String' + :'hash_pass' => :'String', + :'last_reset_password' => :'Time' } end @@ -87,6 +92,10 @@ def initialize(attributes = {}) if attributes.key?(:'hash_pass') self.hash_pass = attributes[:'hash_pass'] end + + if attributes.key?(:'last_reset_password') + self.last_reset_password = attributes[:'last_reset_password'] + end end # Show invalid properties with the reasons. Usually used together with valid? @@ -112,7 +121,8 @@ def ==(o) alg == o.alg && email == o.email && enc_email_with_shared_key == o.enc_email_with_shared_key && - hash_pass == o.hash_pass + hash_pass == o.hash_pass && + last_reset_password == o.last_reset_password end # @see the `==` method @@ -124,7 +134,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [alg, email, enc_email_with_shared_key, hash_pass].hash + [alg, email, enc_email_with_shared_key, hash_pass, last_reset_password].hash end # Builds the object from hash diff --git a/lib/akeyless/models/event_forwarder_create_email.rb b/lib/akeyless/models/event_forwarder_create_email.rb index 2a7cb300..33e13f62 100644 --- a/lib/akeyless/models/event_forwarder_create_email.rb +++ b/lib/akeyless/models/event_forwarder_create_email.rb @@ -25,7 +25,7 @@ class EventForwarderCreateEmail # A comma seperated list of email addresses to send event to attr_accessor :email_to - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Rate of periodic runner repetition in hours @@ -34,7 +34,7 @@ class EventForwarderCreateEmail # Event sources attr_accessor :gateways_event_source_locations - # Set this option to include event errors details [true\\false] + # Set this option to include event errors details [true/false] attr_accessor :include_error # Items Event sources diff --git a/lib/akeyless/models/event_forwarder_create_service_now.rb b/lib/akeyless/models/event_forwarder_create_service_now.rb index 121f70a1..ecde178a 100644 --- a/lib/akeyless/models/event_forwarder_create_service_now.rb +++ b/lib/akeyless/models/event_forwarder_create_service_now.rb @@ -40,7 +40,7 @@ class EventForwarderCreateServiceNow # Description of the object attr_accessor :description - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Rate of periodic runner repetition in hours diff --git a/lib/akeyless/models/event_forwarder_create_slack.rb b/lib/akeyless/models/event_forwarder_create_slack.rb index cfd764b4..fd0e9197 100644 --- a/lib/akeyless/models/event_forwarder_create_slack.rb +++ b/lib/akeyless/models/event_forwarder_create_slack.rb @@ -22,7 +22,7 @@ class EventForwarderCreateSlack # Description of the object attr_accessor :description - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Rate of periodic runner repetition in hours diff --git a/lib/akeyless/models/event_forwarder_create_webhook.rb b/lib/akeyless/models/event_forwarder_create_webhook.rb index 3883ef7e..2de13150 100644 --- a/lib/akeyless/models/event_forwarder_create_webhook.rb +++ b/lib/akeyless/models/event_forwarder_create_webhook.rb @@ -31,7 +31,7 @@ class EventForwarderCreateWebhook # Description of the object attr_accessor :description - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Rate of periodic runner repetition in hours diff --git a/lib/akeyless/models/event_forwarder_update_email.rb b/lib/akeyless/models/event_forwarder_update_email.rb index 35bbcfc3..bce46f9a 100644 --- a/lib/akeyless/models/event_forwarder_update_email.rb +++ b/lib/akeyless/models/event_forwarder_update_email.rb @@ -28,13 +28,13 @@ class EventForwarderUpdateEmail # Enable/Disable Event Forwarder [true/false] attr_accessor :enable - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Event sources attr_accessor :gateways_event_source_locations - # Set this option to include event errors details [true\\false] + # Set this option to include event errors details [true/false] attr_accessor :include_error # Items Event sources diff --git a/lib/akeyless/models/event_forwarder_update_service_now.rb b/lib/akeyless/models/event_forwarder_update_service_now.rb index 0574c723..527be047 100644 --- a/lib/akeyless/models/event_forwarder_update_service_now.rb +++ b/lib/akeyless/models/event_forwarder_update_service_now.rb @@ -43,7 +43,7 @@ class EventForwarderUpdateServiceNow # Enable/Disable Event Forwarder [true/false] attr_accessor :enable - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Event sources diff --git a/lib/akeyless/models/event_forwarder_update_slack.rb b/lib/akeyless/models/event_forwarder_update_slack.rb index b3379624..635268a9 100644 --- a/lib/akeyless/models/event_forwarder_update_slack.rb +++ b/lib/akeyless/models/event_forwarder_update_slack.rb @@ -25,7 +25,7 @@ class EventForwarderUpdateSlack # Enable/Disable Event Forwarder [true/false] attr_accessor :enable - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Event sources diff --git a/lib/akeyless/models/event_forwarder_update_webhook.rb b/lib/akeyless/models/event_forwarder_update_webhook.rb index 178c171e..2c863c7b 100644 --- a/lib/akeyless/models/event_forwarder_update_webhook.rb +++ b/lib/akeyless/models/event_forwarder_update_webhook.rb @@ -34,7 +34,7 @@ class EventForwarderUpdateWebhook # Enable/Disable Event Forwarder [true/false] attr_accessor :enable - # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] + # List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] attr_accessor :event_types # Event sources diff --git a/lib/akeyless/models/gateway_get_remote_access.rb b/lib/akeyless/models/gateway_get_remote_access.rb new file mode 100644 index 00000000..a53a8d1b --- /dev/null +++ b/lib/akeyless/models/gateway_get_remote_access.rb @@ -0,0 +1,238 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gatewayGetRemoteAccess is a command that returns remote access config + class GatewayGetRemoteAccess + # Set output format to JSON + attr_accessor :json + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'json' => :'json', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'json' => :'Boolean', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayGetRemoteAccess` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayGetRemoteAccess`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + json == o.json && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [json, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gateway_update_item.rb b/lib/akeyless/models/gateway_update_item.rb index 28cb4421..2f63466a 100644 --- a/lib/akeyless/models/gateway_update_item.rb +++ b/lib/akeyless/models/gateway_update_item.rb @@ -85,6 +85,9 @@ class GatewayUpdateItem # username to be rotated, if selected \\\"use-self-creds\\\" at rotator-creds-type, this username will try to rotate it's own password, if \\\"use-target-creds\\\" is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Rotation Hour attr_accessor :rotation_hour @@ -129,6 +132,7 @@ def self.attribute_map :'rm_tag' => :'rm-tag', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_creds_type' => :'rotator-creds-type', @@ -169,6 +173,7 @@ def self.openapi_types :'rm_tag' => :'Array', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_creds_type' => :'String', @@ -303,6 +308,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] else @@ -387,6 +398,7 @@ def ==(o) rm_tag == o.rm_tag && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_creds_type == o.rotator_creds_type && @@ -404,7 +416,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, api_id, api_key, app_id, auto_rotate, custom_payload, delete_protection, description, gcp_key, gcp_service_account_email, gcp_service_account_key_id, grace_rotation, json, keep_prev_version, key, name, new_metadata, new_name, new_version, password_length, rm_tag, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, token, type, uid_token].hash + [add_tag, api_id, api_key, app_id, auto_rotate, custom_payload, delete_protection, description, gcp_key, gcp_service_account_email, gcp_service_account_key_id, grace_rotation, json, keep_prev_version, key, name, new_metadata, new_name, new_version, password_length, rm_tag, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_creds_type, token, type, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/gateway_update_remote_access.rb b/lib/akeyless/models/gateway_update_remote_access.rb new file mode 100644 index 00000000..c7e473ba --- /dev/null +++ b/lib/akeyless/models/gateway_update_remote_access.rb @@ -0,0 +1,318 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gatewayUpdateRemoteAccess is a command that update remote access config + class GatewayUpdateRemoteAccess + # List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list) + attr_accessor :allowed_urls + + # Specifies whether to show/hide if the session is currently recorded [true/false] + attr_accessor :hide_session_recording + + # Set output format to JSON + attr_accessor :json + + # Decide which algorithm will be used as part of the SSH initial hand-shake process + attr_accessor :kexalgs + + # Enable support for additional keyboard layouts + attr_accessor :keyboard_layout + + # Signs SSH certificates using legacy ssh-rsa-cert-01@openssh.com signing algorithm [true/false] + attr_accessor :legacy_ssh_algorithm + + # Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email + attr_accessor :rdp_target_configuration + + # Specify the usernameSubClaim that exists inside the IDP JWT, e.g. email + attr_accessor :ssh_target_configuration + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'allowed_urls' => :'allowed-urls', + :'hide_session_recording' => :'hide-session-recording', + :'json' => :'json', + :'kexalgs' => :'kexalgs', + :'keyboard_layout' => :'keyboard-layout', + :'legacy_ssh_algorithm' => :'legacy-ssh-algorithm', + :'rdp_target_configuration' => :'rdp-target-configuration', + :'ssh_target_configuration' => :'ssh-target-configuration', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'allowed_urls' => :'String', + :'hide_session_recording' => :'String', + :'json' => :'Boolean', + :'kexalgs' => :'String', + :'keyboard_layout' => :'String', + :'legacy_ssh_algorithm' => :'String', + :'rdp_target_configuration' => :'String', + :'ssh_target_configuration' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayUpdateRemoteAccess` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayUpdateRemoteAccess`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'allowed_urls') + self.allowed_urls = attributes[:'allowed_urls'] + else + self.allowed_urls = 'use-existing' + end + + if attributes.key?(:'hide_session_recording') + self.hide_session_recording = attributes[:'hide_session_recording'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'kexalgs') + self.kexalgs = attributes[:'kexalgs'] + else + self.kexalgs = 'use-existing' + end + + if attributes.key?(:'keyboard_layout') + self.keyboard_layout = attributes[:'keyboard_layout'] + else + self.keyboard_layout = 'use-existing' + end + + if attributes.key?(:'legacy_ssh_algorithm') + self.legacy_ssh_algorithm = attributes[:'legacy_ssh_algorithm'] + end + + if attributes.key?(:'rdp_target_configuration') + self.rdp_target_configuration = attributes[:'rdp_target_configuration'] + else + self.rdp_target_configuration = 'use-existing' + end + + if attributes.key?(:'ssh_target_configuration') + self.ssh_target_configuration = attributes[:'ssh_target_configuration'] + else + self.ssh_target_configuration = 'use-existing' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + allowed_urls == o.allowed_urls && + hide_session_recording == o.hide_session_recording && + json == o.json && + kexalgs == o.kexalgs && + keyboard_layout == o.keyboard_layout && + legacy_ssh_algorithm == o.legacy_ssh_algorithm && + rdp_target_configuration == o.rdp_target_configuration && + ssh_target_configuration == o.ssh_target_configuration && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [allowed_urls, hide_session_recording, json, kexalgs, keyboard_layout, legacy_ssh_algorithm, rdp_target_configuration, ssh_target_configuration, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb b/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb new file mode 100644 index 00000000..95ca93fc --- /dev/null +++ b/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb @@ -0,0 +1,358 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gatewayUpdateRemoteAccessRdpRecordings is a command that update remote access rdp recording config + class GatewayUpdateRemoteAccessRdpRecordings + # AWS access key id. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html + attr_accessor :aws_storage_access_key_id + + # The AWS bucket name. For more information refer to https://docs.aws.amazon.com/s3/ + attr_accessor :aws_storage_bucket_name + + # The folder name in S3 bucket. For more information refer to https://docs.aws.amazon.com/s3/ + attr_accessor :aws_storage_bucket_prefix + + # The region where the storage is located + attr_accessor :aws_storage_region + + # AWS secret access key. For more information refer to https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html + attr_accessor :aws_storage_secret_access_key + + # Azure account name. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-overview + attr_accessor :azure_storage_account_name + + # Azure client id. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal + attr_accessor :azure_storage_client_id + + # Azure client secret. For more information refer to https://learn.microsoft.com/en-us/azure/storage/common/storage-account-get-info?tabs=portal + attr_accessor :azure_storage_client_secret + + # Azure container name. For more information refer to https://learn.microsoft.com/en-us/rest/api/storageservices/naming-and-referencing-containers--blobs--and-metadata + attr_accessor :azure_storage_container_name + + # Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant + attr_accessor :azure_storage_tenant_id + + # Set output format to JSON + attr_accessor :json + + # Enable recording of rdp session [true/false] + attr_accessor :rdp_session_recording + + # Rdp session recording storage destination [local/aws/azure] + attr_accessor :rdp_session_storage + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'aws_storage_access_key_id' => :'aws-storage-access-key-id', + :'aws_storage_bucket_name' => :'aws-storage-bucket-name', + :'aws_storage_bucket_prefix' => :'aws-storage-bucket-prefix', + :'aws_storage_region' => :'aws-storage-region', + :'aws_storage_secret_access_key' => :'aws-storage-secret-access-key', + :'azure_storage_account_name' => :'azure-storage-account-name', + :'azure_storage_client_id' => :'azure-storage-client-id', + :'azure_storage_client_secret' => :'azure-storage-client-secret', + :'azure_storage_container_name' => :'azure-storage-container-name', + :'azure_storage_tenant_id' => :'azure-storage-tenant-id', + :'json' => :'json', + :'rdp_session_recording' => :'rdp-session-recording', + :'rdp_session_storage' => :'rdp-session-storage', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'aws_storage_access_key_id' => :'String', + :'aws_storage_bucket_name' => :'String', + :'aws_storage_bucket_prefix' => :'String', + :'aws_storage_region' => :'String', + :'aws_storage_secret_access_key' => :'String', + :'azure_storage_account_name' => :'String', + :'azure_storage_client_id' => :'String', + :'azure_storage_client_secret' => :'String', + :'azure_storage_container_name' => :'String', + :'azure_storage_tenant_id' => :'String', + :'json' => :'Boolean', + :'rdp_session_recording' => :'String', + :'rdp_session_storage' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayUpdateRemoteAccessRdpRecordings` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayUpdateRemoteAccessRdpRecordings`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'aws_storage_access_key_id') + self.aws_storage_access_key_id = attributes[:'aws_storage_access_key_id'] + end + + if attributes.key?(:'aws_storage_bucket_name') + self.aws_storage_bucket_name = attributes[:'aws_storage_bucket_name'] + end + + if attributes.key?(:'aws_storage_bucket_prefix') + self.aws_storage_bucket_prefix = attributes[:'aws_storage_bucket_prefix'] + end + + if attributes.key?(:'aws_storage_region') + self.aws_storage_region = attributes[:'aws_storage_region'] + end + + if attributes.key?(:'aws_storage_secret_access_key') + self.aws_storage_secret_access_key = attributes[:'aws_storage_secret_access_key'] + end + + if attributes.key?(:'azure_storage_account_name') + self.azure_storage_account_name = attributes[:'azure_storage_account_name'] + end + + if attributes.key?(:'azure_storage_client_id') + self.azure_storage_client_id = attributes[:'azure_storage_client_id'] + end + + if attributes.key?(:'azure_storage_client_secret') + self.azure_storage_client_secret = attributes[:'azure_storage_client_secret'] + end + + if attributes.key?(:'azure_storage_container_name') + self.azure_storage_container_name = attributes[:'azure_storage_container_name'] + end + + if attributes.key?(:'azure_storage_tenant_id') + self.azure_storage_tenant_id = attributes[:'azure_storage_tenant_id'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'rdp_session_recording') + self.rdp_session_recording = attributes[:'rdp_session_recording'] + end + + if attributes.key?(:'rdp_session_storage') + self.rdp_session_storage = attributes[:'rdp_session_storage'] + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + aws_storage_access_key_id == o.aws_storage_access_key_id && + aws_storage_bucket_name == o.aws_storage_bucket_name && + aws_storage_bucket_prefix == o.aws_storage_bucket_prefix && + aws_storage_region == o.aws_storage_region && + aws_storage_secret_access_key == o.aws_storage_secret_access_key && + azure_storage_account_name == o.azure_storage_account_name && + azure_storage_client_id == o.azure_storage_client_id && + azure_storage_client_secret == o.azure_storage_client_secret && + azure_storage_container_name == o.azure_storage_container_name && + azure_storage_tenant_id == o.azure_storage_tenant_id && + json == o.json && + rdp_session_recording == o.rdp_session_recording && + rdp_session_storage == o.rdp_session_storage && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [aws_storage_access_key_id, aws_storage_bucket_name, aws_storage_bucket_prefix, aws_storage_region, aws_storage_secret_access_key, azure_storage_account_name, azure_storage_client_id, azure_storage_client_secret, azure_storage_container_name, azure_storage_tenant_id, json, rdp_session_recording, rdp_session_storage, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb new file mode 100644 index 00000000..c10c95ca --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb @@ -0,0 +1,346 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsAwsS3 is a command that updates session log forwarding config (aws-s3 target) + class GwUpdateRemoteAccessSessionLogsAwsS3 + # AWS access id relevant for access_key auth-type + attr_accessor :access_id + + # AWS access key relevant for access_key auth-type + attr_accessor :access_key + + # AWS auth type [access_key/cloud_id/assume_role] + attr_accessor :auth_type + + # AWS S3 bucket name + attr_accessor :bucket_name + + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Set output format to JSON + attr_accessor :json + + # AWS S3 destination folder for logs + attr_accessor :log_folder + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # AWS region + attr_accessor :region + + # AWS role arn relevant for assume_role auth-type + attr_accessor :role_arn + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'access_id' => :'access-id', + :'access_key' => :'access-key', + :'auth_type' => :'auth-type', + :'bucket_name' => :'bucket-name', + :'enable' => :'enable', + :'json' => :'json', + :'log_folder' => :'log-folder', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'region' => :'region', + :'role_arn' => :'role-arn', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'access_id' => :'String', + :'access_key' => :'String', + :'auth_type' => :'String', + :'bucket_name' => :'String', + :'enable' => :'String', + :'json' => :'Boolean', + :'log_folder' => :'String', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'region' => :'String', + :'role_arn' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'access_id') + self.access_id = attributes[:'access_id'] + end + + if attributes.key?(:'access_key') + self.access_key = attributes[:'access_key'] + end + + if attributes.key?(:'auth_type') + self.auth_type = attributes[:'auth_type'] + end + + if attributes.key?(:'bucket_name') + self.bucket_name = attributes[:'bucket_name'] + end + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'log_folder') + self.log_folder = attributes[:'log_folder'] + else + self.log_folder = 'use-existing' + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'region') + self.region = attributes[:'region'] + end + + if attributes.key?(:'role_arn') + self.role_arn = attributes[:'role_arn'] + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + access_id == o.access_id && + access_key == o.access_key && + auth_type == o.auth_type && + bucket_name == o.bucket_name && + enable == o.enable && + json == o.json && + log_folder == o.log_folder && + output_format == o.output_format && + pull_interval == o.pull_interval && + region == o.region && + role_arn == o.role_arn && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [access_id, access_key, auth_type, bucket_name, enable, json, log_folder, output_format, pull_interval, region, role_arn, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb new file mode 100644 index 00000000..b64045d9 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb @@ -0,0 +1,294 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsAzureAnalytics is a command that updates session log forwarding config (azure-analytics target) + class GwUpdateRemoteAccessSessionLogsAzureAnalytics + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Set output format to JSON + attr_accessor :json + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Azure workspace id + attr_accessor :workspace_id + + # Azure workspace key + attr_accessor :workspace_key + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'enable' => :'enable', + :'json' => :'json', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'token' => :'token', + :'uid_token' => :'uid-token', + :'workspace_id' => :'workspace-id', + :'workspace_key' => :'workspace-key' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'enable' => :'String', + :'json' => :'Boolean', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'token' => :'String', + :'uid_token' => :'String', + :'workspace_id' => :'String', + :'workspace_key' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + + if attributes.key?(:'workspace_id') + self.workspace_id = attributes[:'workspace_id'] + end + + if attributes.key?(:'workspace_key') + self.workspace_key = attributes[:'workspace_key'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + enable == o.enable && + json == o.json && + output_format == o.output_format && + pull_interval == o.pull_interval && + token == o.token && + uid_token == o.uid_token && + workspace_id == o.workspace_id && + workspace_key == o.workspace_key + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [enable, json, output_format, pull_interval, token, uid_token, workspace_id, workspace_key].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb new file mode 100644 index 00000000..1ef73fd6 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb @@ -0,0 +1,330 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsDatadog is a command that updates session log forwarding config (datadog target) + class GwUpdateRemoteAccessSessionLogsDatadog + # Datadog api key + attr_accessor :api_key + + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Datadog host + attr_accessor :host + + # Set output format to JSON + attr_accessor :json + + # Datadog log service + attr_accessor :log_service + + # Datadog log source + attr_accessor :log_source + + # A comma-separated list of Datadog log tags formatted as \"key:value\" strings + attr_accessor :log_tags + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'api_key' => :'api-key', + :'enable' => :'enable', + :'host' => :'host', + :'json' => :'json', + :'log_service' => :'log-service', + :'log_source' => :'log-source', + :'log_tags' => :'log-tags', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'api_key' => :'String', + :'enable' => :'String', + :'host' => :'String', + :'json' => :'Boolean', + :'log_service' => :'String', + :'log_source' => :'String', + :'log_tags' => :'String', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsDatadog` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsDatadog`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'api_key') + self.api_key = attributes[:'api_key'] + end + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'host') + self.host = attributes[:'host'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'log_service') + self.log_service = attributes[:'log_service'] + else + self.log_service = 'use-existing' + end + + if attributes.key?(:'log_source') + self.log_source = attributes[:'log_source'] + else + self.log_source = 'use-existing' + end + + if attributes.key?(:'log_tags') + self.log_tags = attributes[:'log_tags'] + else + self.log_tags = 'use-existing' + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + api_key == o.api_key && + enable == o.enable && + host == o.host && + json == o.json && + log_service == o.log_service && + log_source == o.log_source && + log_tags == o.log_tags && + output_format == o.output_format && + pull_interval == o.pull_interval && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [api_key, enable, host, json, log_service, log_source, log_tags, output_format, pull_interval, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb new file mode 100644 index 00000000..39b7bf33 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb @@ -0,0 +1,376 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsElasticsearch is a command that updates session log forwarding config (elasticsearch target) + class GwUpdateRemoteAccessSessionLogsElasticsearch + # Elasticsearch api key relevant only for api_key auth-type + attr_accessor :api_key + + # Elasticsearch auth type [api_key/password] + attr_accessor :auth_type + + # Elasticsearch cloud id relevant only for cloud server-type + attr_accessor :cloud_id + + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Enable tls + attr_accessor :enable_tls + + # Elasticsearch index + attr_accessor :index + + # Set output format to JSON + attr_accessor :json + + # Elasticsearch nodes relevant only for nodes server-type + attr_accessor :nodes + + # Logs format [text/json] + attr_accessor :output_format + + # Elasticsearch password relevant only for password auth-type + attr_accessor :password + + # Pull interval in seconds + attr_accessor :pull_interval + + # Elasticsearch server type [cloud/nodes] + attr_accessor :server_type + + # Elasticsearch tls certificate + attr_accessor :tls_certificate + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Elasticsearch user name relevant only for password auth-type + attr_accessor :user_name + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'api_key' => :'api-key', + :'auth_type' => :'auth-type', + :'cloud_id' => :'cloud-id', + :'enable' => :'enable', + :'enable_tls' => :'enable-tls', + :'index' => :'index', + :'json' => :'json', + :'nodes' => :'nodes', + :'output_format' => :'output-format', + :'password' => :'password', + :'pull_interval' => :'pull-interval', + :'server_type' => :'server-type', + :'tls_certificate' => :'tls-certificate', + :'token' => :'token', + :'uid_token' => :'uid-token', + :'user_name' => :'user-name' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'api_key' => :'String', + :'auth_type' => :'String', + :'cloud_id' => :'String', + :'enable' => :'String', + :'enable_tls' => :'Boolean', + :'index' => :'String', + :'json' => :'Boolean', + :'nodes' => :'String', + :'output_format' => :'String', + :'password' => :'String', + :'pull_interval' => :'String', + :'server_type' => :'String', + :'tls_certificate' => :'String', + :'token' => :'String', + :'uid_token' => :'String', + :'user_name' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'api_key') + self.api_key = attributes[:'api_key'] + end + + if attributes.key?(:'auth_type') + self.auth_type = attributes[:'auth_type'] + end + + if attributes.key?(:'cloud_id') + self.cloud_id = attributes[:'cloud_id'] + end + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'enable_tls') + self.enable_tls = attributes[:'enable_tls'] + end + + if attributes.key?(:'index') + self.index = attributes[:'index'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'nodes') + self.nodes = attributes[:'nodes'] + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'password') + self.password = attributes[:'password'] + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'server_type') + self.server_type = attributes[:'server_type'] + end + + if attributes.key?(:'tls_certificate') + self.tls_certificate = attributes[:'tls_certificate'] + else + self.tls_certificate = 'use-existing' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + + if attributes.key?(:'user_name') + self.user_name = attributes[:'user_name'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + api_key == o.api_key && + auth_type == o.auth_type && + cloud_id == o.cloud_id && + enable == o.enable && + enable_tls == o.enable_tls && + index == o.index && + json == o.json && + nodes == o.nodes && + output_format == o.output_format && + password == o.password && + pull_interval == o.pull_interval && + server_type == o.server_type && + tls_certificate == o.tls_certificate && + token == o.token && + uid_token == o.uid_token && + user_name == o.user_name + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [api_key, auth_type, cloud_id, enable, enable_tls, index, json, nodes, output_format, password, pull_interval, server_type, tls_certificate, token, uid_token, user_name].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb new file mode 100644 index 00000000..8a878078 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb @@ -0,0 +1,314 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsGoogleChronicle is a command that updates session log forwarding config (google-chronicle target) + class GwUpdateRemoteAccessSessionLogsGoogleChronicle + # Google chronicle customer id + attr_accessor :customer_id + + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Base64-encoded service account private key text + attr_accessor :gcp_key + + # Set output format to JSON + attr_accessor :json + + # Google chronicle log type + attr_accessor :log_type + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # Google chronicle region [eu_multi_region/london/us_multi_region/singapore/tel_aviv] + attr_accessor :region + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'customer_id' => :'customer-id', + :'enable' => :'enable', + :'gcp_key' => :'gcp-key', + :'json' => :'json', + :'log_type' => :'log-type', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'region' => :'region', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'customer_id' => :'String', + :'enable' => :'String', + :'gcp_key' => :'String', + :'json' => :'Boolean', + :'log_type' => :'String', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'region' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'customer_id') + self.customer_id = attributes[:'customer_id'] + end + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'gcp_key') + self.gcp_key = attributes[:'gcp_key'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'log_type') + self.log_type = attributes[:'log_type'] + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'region') + self.region = attributes[:'region'] + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + customer_id == o.customer_id && + enable == o.enable && + gcp_key == o.gcp_key && + json == o.json && + log_type == o.log_type && + output_format == o.output_format && + pull_interval == o.pull_interval && + region == o.region && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [customer_id, enable, gcp_key, json, log_type, output_format, pull_interval, region, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb new file mode 100644 index 00000000..aa92cfd2 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb @@ -0,0 +1,316 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsLogstash is a command that updates session log forwarding config (logstash target) + class GwUpdateRemoteAccessSessionLogsLogstash + # Logstash dns + attr_accessor :dns + + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Enable tls + attr_accessor :enable_tls + + # Set output format to JSON + attr_accessor :json + + # Logs format [text/json] + attr_accessor :output_format + + # Logstash protocol [tcp/udp] + attr_accessor :protocol + + # Pull interval in seconds + attr_accessor :pull_interval + + # Logstash tls certificate + attr_accessor :tls_certificate + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'dns' => :'dns', + :'enable' => :'enable', + :'enable_tls' => :'enable-tls', + :'json' => :'json', + :'output_format' => :'output-format', + :'protocol' => :'protocol', + :'pull_interval' => :'pull-interval', + :'tls_certificate' => :'tls-certificate', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'dns' => :'String', + :'enable' => :'String', + :'enable_tls' => :'Boolean', + :'json' => :'Boolean', + :'output_format' => :'String', + :'protocol' => :'String', + :'pull_interval' => :'String', + :'tls_certificate' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsLogstash` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsLogstash`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'dns') + self.dns = attributes[:'dns'] + end + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'enable_tls') + self.enable_tls = attributes[:'enable_tls'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'protocol') + self.protocol = attributes[:'protocol'] + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'tls_certificate') + self.tls_certificate = attributes[:'tls_certificate'] + else + self.tls_certificate = 'use-existing' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + dns == o.dns && + enable == o.enable && + enable_tls == o.enable_tls && + json == o.json && + output_format == o.output_format && + protocol == o.protocol && + pull_interval == o.pull_interval && + tls_certificate == o.tls_certificate && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [dns, enable, enable_tls, json, output_format, protocol, pull_interval, tls_certificate, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb new file mode 100644 index 00000000..18cb9c16 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb @@ -0,0 +1,294 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsLogzIo is a command that updates session log forwarding config (logz-io target) + class GwUpdateRemoteAccessSessionLogsLogzIo + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Set output format to JSON + attr_accessor :json + + # Logz-io token + attr_accessor :logz_io_token + + # Logs format [text/json] + attr_accessor :output_format + + # LogzIo protocol [tcp/https] + attr_accessor :protocol + + # Pull interval in seconds + attr_accessor :pull_interval + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'enable' => :'enable', + :'json' => :'json', + :'logz_io_token' => :'logz-io-token', + :'output_format' => :'output-format', + :'protocol' => :'protocol', + :'pull_interval' => :'pull-interval', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'enable' => :'String', + :'json' => :'Boolean', + :'logz_io_token' => :'String', + :'output_format' => :'String', + :'protocol' => :'String', + :'pull_interval' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'logz_io_token') + self.logz_io_token = attributes[:'logz_io_token'] + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'protocol') + self.protocol = attributes[:'protocol'] + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + enable == o.enable && + json == o.json && + logz_io_token == o.logz_io_token && + output_format == o.output_format && + protocol == o.protocol && + pull_interval == o.pull_interval && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [enable, json, logz_io_token, output_format, protocol, pull_interval, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb new file mode 100644 index 00000000..b17fe7ed --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb @@ -0,0 +1,350 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsSplunk is a command that updates session log forwarding config (splunk target) + class GwUpdateRemoteAccessSessionLogsSplunk + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Enable tls + attr_accessor :enable_tls + + # Splunk index + attr_accessor :index + + # Set output format to JSON + attr_accessor :json + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # Splunk source + attr_accessor :source + + # Splunk source type + attr_accessor :source_type + + # Splunk token + attr_accessor :splunk_token + + # Splunk server URL + attr_accessor :splunk_url + + # Splunk tls certificate + attr_accessor :tls_certificate + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'enable' => :'enable', + :'enable_tls' => :'enable-tls', + :'index' => :'index', + :'json' => :'json', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'source' => :'source', + :'source_type' => :'source-type', + :'splunk_token' => :'splunk-token', + :'splunk_url' => :'splunk-url', + :'tls_certificate' => :'tls-certificate', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'enable' => :'String', + :'enable_tls' => :'Boolean', + :'index' => :'String', + :'json' => :'Boolean', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'source' => :'String', + :'source_type' => :'String', + :'splunk_token' => :'String', + :'splunk_url' => :'String', + :'tls_certificate' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsSplunk` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsSplunk`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'enable_tls') + self.enable_tls = attributes[:'enable_tls'] + end + + if attributes.key?(:'index') + self.index = attributes[:'index'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'source') + self.source = attributes[:'source'] + else + self.source = 'use-existing' + end + + if attributes.key?(:'source_type') + self.source_type = attributes[:'source_type'] + else + self.source_type = 'use-existing' + end + + if attributes.key?(:'splunk_token') + self.splunk_token = attributes[:'splunk_token'] + end + + if attributes.key?(:'splunk_url') + self.splunk_url = attributes[:'splunk_url'] + end + + if attributes.key?(:'tls_certificate') + self.tls_certificate = attributes[:'tls_certificate'] + else + self.tls_certificate = 'use-existing' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + enable == o.enable && + enable_tls == o.enable_tls && + index == o.index && + json == o.json && + output_format == o.output_format && + pull_interval == o.pull_interval && + source == o.source && + source_type == o.source_type && + splunk_token == o.splunk_token && + splunk_url == o.splunk_url && + tls_certificate == o.tls_certificate && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [enable, enable_tls, index, json, output_format, pull_interval, source, source_type, splunk_token, splunk_url, tls_certificate, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb new file mode 100644 index 00000000..f01927ee --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb @@ -0,0 +1,274 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsStdout is a command that updates session log forwarding config (stdout target) + class GwUpdateRemoteAccessSessionLogsStdout + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Set output format to JSON + attr_accessor :json + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'enable' => :'enable', + :'json' => :'json', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'enable' => :'String', + :'json' => :'Boolean', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsStdout` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsStdout`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + enable == o.enable && + json == o.json && + output_format == o.output_format && + pull_interval == o.pull_interval && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [enable, json, output_format, pull_interval, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb new file mode 100644 index 00000000..fd5b6a4d --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb @@ -0,0 +1,308 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsSumologic is a command that updates session log forwarding config (sumologic target) + class GwUpdateRemoteAccessSessionLogsSumologic + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Sumologic endpoint URL + attr_accessor :endpoint + + # Sumologic host + attr_accessor :host + + # Set output format to JSON + attr_accessor :json + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # A comma-separated list of Sumologic tags + attr_accessor :sumologic_tags + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'enable' => :'enable', + :'endpoint' => :'endpoint', + :'host' => :'host', + :'json' => :'json', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'sumologic_tags' => :'sumologic-tags', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'enable' => :'String', + :'endpoint' => :'String', + :'host' => :'String', + :'json' => :'Boolean', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'sumologic_tags' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsSumologic` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsSumologic`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'endpoint') + self.endpoint = attributes[:'endpoint'] + end + + if attributes.key?(:'host') + self.host = attributes[:'host'] + else + self.host = 'use-existing' + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'sumologic_tags') + self.sumologic_tags = attributes[:'sumologic_tags'] + else + self.sumologic_tags = 'use-existing' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + enable == o.enable && + endpoint == o.endpoint && + host == o.host && + json == o.json && + output_format == o.output_format && + pull_interval == o.pull_interval && + sumologic_tags == o.sumologic_tags && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [enable, endpoint, host, json, output_format, pull_interval, sumologic_tags, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb b/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb new file mode 100644 index 00000000..de5a6ed7 --- /dev/null +++ b/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb @@ -0,0 +1,342 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # gwUpdateRemoteAccessSessionLogsSyslog is a command that updates session log forwarding config (syslog target) + class GwUpdateRemoteAccessSessionLogsSyslog + # Enable Log Forwarding [true/false] + attr_accessor :enable + + # Enable tls relevant only for network type TCP + attr_accessor :enable_tls + + # Syslog formatter [text/cef] + attr_accessor :formatter + + # Syslog host + attr_accessor :host + + # Set output format to JSON + attr_accessor :json + + # Syslog network [tcp/udp] + attr_accessor :network + + # Logs format [text/json] + attr_accessor :output_format + + # Pull interval in seconds + attr_accessor :pull_interval + + # Syslog target tag + attr_accessor :target_tag + + # Syslog tls certificate + attr_accessor :tls_certificate + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'enable' => :'enable', + :'enable_tls' => :'enable-tls', + :'formatter' => :'formatter', + :'host' => :'host', + :'json' => :'json', + :'network' => :'network', + :'output_format' => :'output-format', + :'pull_interval' => :'pull-interval', + :'target_tag' => :'target-tag', + :'tls_certificate' => :'tls-certificate', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'enable' => :'String', + :'enable_tls' => :'Boolean', + :'formatter' => :'String', + :'host' => :'String', + :'json' => :'Boolean', + :'network' => :'String', + :'output_format' => :'String', + :'pull_interval' => :'String', + :'target_tag' => :'String', + :'tls_certificate' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GwUpdateRemoteAccessSessionLogsSyslog` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GwUpdateRemoteAccessSessionLogsSyslog`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + else + self.enable = 'true' + end + + if attributes.key?(:'enable_tls') + self.enable_tls = attributes[:'enable_tls'] + end + + if attributes.key?(:'formatter') + self.formatter = attributes[:'formatter'] + else + self.formatter = 'text' + end + + if attributes.key?(:'host') + self.host = attributes[:'host'] + end + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'network') + self.network = attributes[:'network'] + else + self.network = 'tcp' + end + + if attributes.key?(:'output_format') + self.output_format = attributes[:'output_format'] + else + self.output_format = 'text' + end + + if attributes.key?(:'pull_interval') + self.pull_interval = attributes[:'pull_interval'] + else + self.pull_interval = '10' + end + + if attributes.key?(:'target_tag') + self.target_tag = attributes[:'target_tag'] + else + self.target_tag = 'use-existing' + end + + if attributes.key?(:'tls_certificate') + self.tls_certificate = attributes[:'tls_certificate'] + else + self.tls_certificate = 'use-existing' + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + enable == o.enable && + enable_tls == o.enable_tls && + formatter == o.formatter && + host == o.host && + json == o.json && + network == o.network && + output_format == o.output_format && + pull_interval == o.pull_interval && + target_tag == o.target_tag && + tls_certificate == o.tls_certificate && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [enable, enable_tls, formatter, host, json, network, output_format, pull_interval, target_tag, tls_certificate, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/item_general_info.rb b/lib/akeyless/models/item_general_info.rb index 6aaad174..760889e2 100644 --- a/lib/akeyless/models/item_general_info.rb +++ b/lib/akeyless/models/item_general_info.rb @@ -31,8 +31,12 @@ class ItemGeneralInfo attr_accessor :dynamic_secret_producer_details + attr_accessor :expiration_events + attr_accessor :importer_info + attr_accessor :next_rotation_events + attr_accessor :oidc_client_info attr_accessor :password_policy @@ -56,7 +60,9 @@ def self.attribute_map :'cluster_gw_url' => :'cluster_gw_url', :'display_metadata' => :'display_metadata', :'dynamic_secret_producer_details' => :'dynamic_secret_producer_details', + :'expiration_events' => :'expiration_events', :'importer_info' => :'importer_info', + :'next_rotation_events' => :'next_rotation_events', :'oidc_client_info' => :'oidc_client_info', :'password_policy' => :'password_policy', :'rotated_secret_details' => :'rotated_secret_details', @@ -82,7 +88,9 @@ def self.openapi_types :'cluster_gw_url' => :'String', :'display_metadata' => :'String', :'dynamic_secret_producer_details' => :'DynamicSecretProducerInfo', + :'expiration_events' => :'Array', :'importer_info' => :'ImporterInfo', + :'next_rotation_events' => :'Array', :'oidc_client_info' => :'OidcClientInfo', :'password_policy' => :'PasswordPolicyInfo', :'rotated_secret_details' => :'RotatedSecretDetailsInfo', @@ -145,10 +153,22 @@ def initialize(attributes = {}) self.dynamic_secret_producer_details = attributes[:'dynamic_secret_producer_details'] end + if attributes.key?(:'expiration_events') + if (value = attributes[:'expiration_events']).is_a?(Array) + self.expiration_events = value + end + end + if attributes.key?(:'importer_info') self.importer_info = attributes[:'importer_info'] end + if attributes.key?(:'next_rotation_events') + if (value = attributes[:'next_rotation_events']).is_a?(Array) + self.next_rotation_events = value + end + end + if attributes.key?(:'oidc_client_info') self.oidc_client_info = attributes[:'oidc_client_info'] end @@ -202,7 +222,9 @@ def ==(o) cluster_gw_url == o.cluster_gw_url && display_metadata == o.display_metadata && dynamic_secret_producer_details == o.dynamic_secret_producer_details && + expiration_events == o.expiration_events && importer_info == o.importer_info && + next_rotation_events == o.next_rotation_events && oidc_client_info == o.oidc_client_info && password_policy == o.password_policy && rotated_secret_details == o.rotated_secret_details && @@ -220,7 +242,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [cert_issue_details, certificate_chain_info, certificate_format, certificates_template_info, classic_key_details, cluster_gw_url, display_metadata, dynamic_secret_producer_details, importer_info, oidc_client_info, password_policy, rotated_secret_details, secure_remote_access_details, static_secret_info, tokenizer_info].hash + [cert_issue_details, certificate_chain_info, certificate_format, certificates_template_info, classic_key_details, cluster_gw_url, display_metadata, dynamic_secret_producer_details, expiration_events, importer_info, next_rotation_events, oidc_client_info, password_policy, rotated_secret_details, secure_remote_access_details, static_secret_info, tokenizer_info].hash end # Builds the object from hash diff --git a/lib/akeyless/models/next_auto_rotation_event.rb b/lib/akeyless/models/next_auto_rotation_event.rb new file mode 100644 index 00000000..1e3f85ec --- /dev/null +++ b/lib/akeyless/models/next_auto_rotation_event.rb @@ -0,0 +1,214 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class NextAutoRotationEvent + attr_accessor :seconds_before + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'seconds_before' => :'seconds_before' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'seconds_before' => :'Integer' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::NextAutoRotationEvent` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::NextAutoRotationEvent`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'seconds_before') + self.seconds_before = attributes[:'seconds_before'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + seconds_before == o.seconds_before + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [seconds_before].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/password_expiration_info.rb b/lib/akeyless/models/password_expiration_info.rb new file mode 100644 index 00000000..2d234eb0 --- /dev/null +++ b/lib/akeyless/models/password_expiration_info.rb @@ -0,0 +1,242 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class PasswordExpirationInfo + attr_accessor :days_before_expire + + attr_accessor :days_before_notification + + # r/o calculated parameter + attr_accessor :days_until_expire + + attr_accessor :enable + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'days_before_expire' => :'days_before_expire', + :'days_before_notification' => :'days_before_notification', + :'days_until_expire' => :'days_until_expire', + :'enable' => :'enable' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'days_before_expire' => :'Integer', + :'days_before_notification' => :'Integer', + :'days_until_expire' => :'Integer', + :'enable' => :'Boolean' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::PasswordExpirationInfo` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::PasswordExpirationInfo`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'days_before_expire') + self.days_before_expire = attributes[:'days_before_expire'] + end + + if attributes.key?(:'days_before_notification') + self.days_before_notification = attributes[:'days_before_notification'] + end + + if attributes.key?(:'days_until_expire') + self.days_until_expire = attributes[:'days_until_expire'] + end + + if attributes.key?(:'enable') + self.enable = attributes[:'enable'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + days_before_expire == o.days_before_expire && + days_before_notification == o.days_before_notification && + days_until_expire == o.days_until_expire && + enable == o.enable + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [days_before_expire, days_before_notification, days_until_expire, enable].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/reset_access_key.rb b/lib/akeyless/models/reset_access_key.rb new file mode 100644 index 00000000..6250fe20 --- /dev/null +++ b/lib/akeyless/models/reset_access_key.rb @@ -0,0 +1,255 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # resetAccessKey is a command that resets an access key + class ResetAccessKey + # Set output format to JSON + attr_accessor :json + + # Auth Method name + attr_accessor :name + + # Authentication token (see `/auth` and `/configure`) + attr_accessor :token + + # The universal identity token, Required only for universal_identity authentication + attr_accessor :uid_token + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'json' => :'json', + :'name' => :'name', + :'token' => :'token', + :'uid_token' => :'uid-token' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'json' => :'Boolean', + :'name' => :'String', + :'token' => :'String', + :'uid_token' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::ResetAccessKey` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::ResetAccessKey`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'json') + self.json = attributes[:'json'] + else + self.json = false + end + + if attributes.key?(:'name') + self.name = attributes[:'name'] + else + self.name = nil + end + + if attributes.key?(:'token') + self.token = attributes[:'token'] + end + + if attributes.key?(:'uid_token') + self.uid_token = attributes[:'uid_token'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + if @name.nil? + invalid_properties.push('invalid value for "name", name cannot be nil.') + end + + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + return false if @name.nil? + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + json == o.json && + name == o.name && + token == o.token && + uid_token == o.uid_token + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [json, name, token, uid_token].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/reset_auth_method_access_key_output.rb b/lib/akeyless/models/reset_auth_method_access_key_output.rb new file mode 100644 index 00000000..49592214 --- /dev/null +++ b/lib/akeyless/models/reset_auth_method_access_key_output.rb @@ -0,0 +1,215 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + # ResetAuthMethodAccessKeyOutput defines output of ResetAuthMethodAccessKey operation. + class ResetAuthMethodAccessKeyOutput + attr_accessor :access_key + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'access_key' => :'access_key' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'access_key' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::ResetAuthMethodAccessKeyOutput` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::ResetAuthMethodAccessKeyOutput`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'access_key') + self.access_key = attributes[:'access_key'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + access_key == o.access_key + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [access_key].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/rollback_secret.rb b/lib/akeyless/models/rollback_secret.rb index 560645ae..b831d659 100644 --- a/lib/akeyless/models/rollback_secret.rb +++ b/lib/akeyless/models/rollback_secret.rb @@ -15,6 +15,9 @@ module Akeyless class RollbackSecret + # for personal password manager + attr_accessor :accessibility + # Set output format to JSON attr_accessor :json @@ -33,6 +36,7 @@ class RollbackSecret # Attribute mapping from ruby-style variable name to JSON key. def self.attribute_map { + :'accessibility' => :'accessibility', :'json' => :'json', :'name' => :'name', :'old_version' => :'old-version', @@ -49,6 +53,7 @@ def self.acceptable_attributes # Attribute type mapping. def self.openapi_types { + :'accessibility' => :'String', :'json' => :'Boolean', :'name' => :'String', :'old_version' => :'Integer', @@ -78,6 +83,12 @@ def initialize(attributes = {}) h[k.to_sym] = v } + if attributes.key?(:'accessibility') + self.accessibility = attributes[:'accessibility'] + else + self.accessibility = 'regular' + end + if attributes.key?(:'json') self.json = attributes[:'json'] else @@ -135,6 +146,7 @@ def valid? def ==(o) return true if self.equal?(o) self.class == o.class && + accessibility == o.accessibility && json == o.json && name == o.name && old_version == o.old_version && @@ -151,7 +163,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [json, name, old_version, token, uid_token].hash + [accessibility, json, name, old_version, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_aws.rb b/lib/akeyless/models/rotated_secret_create_aws.rb index cf4bef53..c03aba00 100644 --- a/lib/akeyless/models/rotated_secret_create_aws.rb +++ b/lib/akeyless/models/rotated_secret_create_aws.rb @@ -57,6 +57,9 @@ class RotatedSecretCreateAws # Rotate the value of the secret after SRA session ends [true/false] attr_accessor :rotate_after_disconnect + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -107,6 +110,7 @@ def self.attribute_map :'name' => :'name', :'password_length' => :'password-length', :'rotate_after_disconnect' => :'rotate-after-disconnect', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -143,6 +147,7 @@ def self.openapi_types :'name' => :'String', :'password_length' => :'String', :'rotate_after_disconnect' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -244,6 +249,12 @@ def initialize(attributes = {}) self.rotate_after_disconnect = 'false' end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -344,6 +355,7 @@ def ==(o) name == o.name && password_length == o.password_length && rotate_after_disconnect == o.rotate_after_disconnect && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -366,7 +378,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [api_id, api_key, authentication_credentials, auto_rotate, aws_region, delete_protection, description, grace_rotation, json, key, max_versions, name, password_length, rotate_after_disconnect, rotation_hour, rotation_interval, rotator_type, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_enable, tags, target_name, token, uid_token].hash + [api_id, api_key, authentication_credentials, auto_rotate, aws_region, delete_protection, description, grace_rotation, json, key, max_versions, name, password_length, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_enable, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_azure.rb b/lib/akeyless/models/rotated_secret_create_azure.rb index 0b4428f5..c58f07dc 100644 --- a/lib/akeyless/models/rotated_secret_create_azure.rb +++ b/lib/akeyless/models/rotated_secret_create_azure.rb @@ -54,6 +54,9 @@ class RotatedSecretCreateAzure # Rotate the value of the secret after SRA session ends [true/false] attr_accessor :rotate_after_disconnect + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -115,6 +118,7 @@ def self.attribute_map :'name' => :'name', :'password_length' => :'password-length', :'rotate_after_disconnect' => :'rotate-after-disconnect', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -154,6 +158,7 @@ def self.openapi_types :'name' => :'String', :'password_length' => :'String', :'rotate_after_disconnect' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -253,6 +258,12 @@ def initialize(attributes = {}) self.rotate_after_disconnect = 'false' end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -374,6 +385,7 @@ def ==(o) name == o.name && password_length == o.password_length && rotate_after_disconnect == o.rotate_after_disconnect && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -400,7 +412,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [api_id, api_key, application_id, authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotation_hour, rotation_interval, rotator_type, secure_access_disable_concurrent_connections, secure_access_enable, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, storage_account_key_name, tags, target_name, token, uid_token, username].hash + [api_id, api_key, application_id, authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_disable_concurrent_connections, secure_access_enable, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, storage_account_key_name, tags, target_name, token, uid_token, username].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_cassandra.rb b/lib/akeyless/models/rotated_secret_create_cassandra.rb index 914d240c..e3554999 100644 --- a/lib/akeyless/models/rotated_secret_create_cassandra.rb +++ b/lib/akeyless/models/rotated_secret_create_cassandra.rb @@ -48,6 +48,9 @@ class RotatedSecretCreateCassandra # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -83,6 +86,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -112,6 +116,7 @@ def self.openapi_types :'password_length' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -193,6 +198,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -274,6 +285,7 @@ def ==(o) password_length == o.password_length && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_custom.rb b/lib/akeyless/models/rotated_secret_create_custom.rb index ffb33d8d..5928b605 100644 --- a/lib/akeyless/models/rotated_secret_create_custom.rb +++ b/lib/akeyless/models/rotated_secret_create_custom.rb @@ -48,6 +48,9 @@ class RotatedSecretCreateCustom # Rotate the value of the secret after SRA session ends [true/false] attr_accessor :rotate_after_disconnect + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -116,6 +119,7 @@ def self.attribute_map :'name' => :'name', :'password_length' => :'password-length', :'rotate_after_disconnect' => :'rotate-after-disconnect', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_allow_external_user' => :'secure-access-allow-external-user', @@ -156,6 +160,7 @@ def self.openapi_types :'name' => :'String', :'password_length' => :'String', :'rotate_after_disconnect' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_allow_external_user' => :'Boolean', @@ -250,6 +255,12 @@ def initialize(attributes = {}) self.rotate_after_disconnect = 'false' end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -380,6 +391,7 @@ def ==(o) name == o.name && password_length == o.password_length && rotate_after_disconnect == o.rotate_after_disconnect && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_allow_external_user == o.secure_access_allow_external_user && @@ -409,7 +421,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, custom_payload, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotation_hour, rotation_interval, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, timeout_sec, token, uid_token].hash + [authentication_credentials, auto_rotate, custom_payload, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, timeout_sec, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_dockerhub.rb b/lib/akeyless/models/rotated_secret_create_dockerhub.rb index d6227ecc..8c016c0b 100644 --- a/lib/akeyless/models/rotated_secret_create_dockerhub.rb +++ b/lib/akeyless/models/rotated_secret_create_dockerhub.rb @@ -42,6 +42,9 @@ class RotatedSecretCreateDockerhub # The length of the password to be generated attr_accessor :password_length + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -72,6 +75,7 @@ def self.attribute_map :'max_versions' => :'max-versions', :'name' => :'name', :'password_length' => :'password-length', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'tags' => :'tags', @@ -98,6 +102,7 @@ def self.openapi_types :'max_versions' => :'String', :'name' => :'String', :'password_length' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'tags' => :'Array', @@ -170,6 +175,12 @@ def initialize(attributes = {}) self.password_length = attributes[:'password_length'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -238,6 +249,7 @@ def ==(o) max_versions == o.max_versions && name == o.name && password_length == o.password_length && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && tags == o.tags && @@ -255,7 +267,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotation_hour, rotation_interval, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotation_event_in, rotation_hour, rotation_interval, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_gcp.rb b/lib/akeyless/models/rotated_secret_create_gcp.rb index b1b2fd46..2c69c3b8 100644 --- a/lib/akeyless/models/rotated_secret_create_gcp.rb +++ b/lib/akeyless/models/rotated_secret_create_gcp.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateGcp # The length of the password to be generated attr_accessor :password_length + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -87,6 +90,7 @@ def self.attribute_map :'max_versions' => :'max-versions', :'name' => :'name', :'password_length' => :'password-length', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -117,6 +121,7 @@ def self.openapi_types :'max_versions' => :'String', :'name' => :'String', :'password_length' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -202,6 +207,12 @@ def initialize(attributes = {}) self.password_length = attributes[:'password_length'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -284,6 +295,7 @@ def ==(o) max_versions == o.max_versions && name == o.name && password_length == o.password_length && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -302,7 +314,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, gcp_key, gcp_service_account_email, gcp_service_account_key_id, json, key, max_versions, name, password_length, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, gcp_key, gcp_service_account_email, gcp_service_account_key_id, json, key, max_versions, name, password_length, rotation_event_in, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_hanadb.rb b/lib/akeyless/models/rotated_secret_create_hanadb.rb index 21c9c7fc..aa8f4fe8 100644 --- a/lib/akeyless/models/rotated_secret_create_hanadb.rb +++ b/lib/akeyless/models/rotated_secret_create_hanadb.rb @@ -48,6 +48,9 @@ class RotatedSecretCreateHanadb # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -83,6 +86,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -112,6 +116,7 @@ def self.openapi_types :'password_length' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -193,6 +198,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -274,6 +285,7 @@ def ==(o) password_length == o.password_length && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_ldap.rb b/lib/akeyless/models/rotated_secret_create_ldap.rb index a8ce2742..3dd44855 100644 --- a/lib/akeyless/models/rotated_secret_create_ldap.rb +++ b/lib/akeyless/models/rotated_secret_create_ldap.rb @@ -56,6 +56,9 @@ class RotatedSecretCreateLdap # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -124,6 +127,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -166,6 +170,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -271,6 +276,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -407,6 +418,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -435,7 +447,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [provider_type, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target, target_name, token, uid_token, user_attribute, user_dn].hash + [provider_type, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target, target_name, token, uid_token, user_attribute, user_dn].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_mongodb.rb b/lib/akeyless/models/rotated_secret_create_mongodb.rb index dca1634c..405d9b4b 100644 --- a/lib/akeyless/models/rotated_secret_create_mongodb.rb +++ b/lib/akeyless/models/rotated_secret_create_mongodb.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateMongodb # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -102,6 +105,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -137,6 +141,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -229,6 +234,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -335,6 +346,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -358,7 +370,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_mssql.rb b/lib/akeyless/models/rotated_secret_create_mssql.rb index e80fd8da..5ff1c486 100644 --- a/lib/akeyless/models/rotated_secret_create_mssql.rb +++ b/lib/akeyless/models/rotated_secret_create_mssql.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateMssql # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -105,6 +108,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -141,6 +145,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -234,6 +239,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -344,6 +355,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -368,7 +380,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_mysql.rb b/lib/akeyless/models/rotated_secret_create_mysql.rb index d65e2d91..f6d33924 100644 --- a/lib/akeyless/models/rotated_secret_create_mysql.rb +++ b/lib/akeyless/models/rotated_secret_create_mysql.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateMysql # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -102,6 +105,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -137,6 +141,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -229,6 +234,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -335,6 +346,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -358,7 +370,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_oracledb.rb b/lib/akeyless/models/rotated_secret_create_oracledb.rb index 8f72b226..5185490e 100644 --- a/lib/akeyless/models/rotated_secret_create_oracledb.rb +++ b/lib/akeyless/models/rotated_secret_create_oracledb.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateOracledb # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -99,6 +102,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -133,6 +137,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -224,6 +229,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -326,6 +337,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -348,7 +360,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_postgresql.rb b/lib/akeyless/models/rotated_secret_create_postgresql.rb index d1291221..f644eace 100644 --- a/lib/akeyless/models/rotated_secret_create_postgresql.rb +++ b/lib/akeyless/models/rotated_secret_create_postgresql.rb @@ -51,6 +51,9 @@ class RotatedSecretCreatePostgresql # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -105,6 +108,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -141,6 +145,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -234,6 +239,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -344,6 +355,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -368,7 +380,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_redis.rb b/lib/akeyless/models/rotated_secret_create_redis.rb index b36ad351..0162c9ab 100644 --- a/lib/akeyless/models/rotated_secret_create_redis.rb +++ b/lib/akeyless/models/rotated_secret_create_redis.rb @@ -48,6 +48,9 @@ class RotatedSecretCreateRedis # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -83,6 +86,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -112,6 +116,7 @@ def self.openapi_types :'password_length' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -193,6 +198,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -274,6 +285,7 @@ def ==(o) password_length == o.password_length && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_redshift.rb b/lib/akeyless/models/rotated_secret_create_redshift.rb index d3a48ced..acb2809c 100644 --- a/lib/akeyless/models/rotated_secret_create_redshift.rb +++ b/lib/akeyless/models/rotated_secret_create_redshift.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateRedshift # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -96,6 +99,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -129,6 +133,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -219,6 +224,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -315,6 +326,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -336,7 +348,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, secure_access_db_name, secure_access_enable, secure_access_host, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_db_name, secure_access_enable, secure_access_host, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_snowflake.rb b/lib/akeyless/models/rotated_secret_create_snowflake.rb index ad22eab7..34094e5e 100644 --- a/lib/akeyless/models/rotated_secret_create_snowflake.rb +++ b/lib/akeyless/models/rotated_secret_create_snowflake.rb @@ -48,6 +48,9 @@ class RotatedSecretCreateSnowflake # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -83,6 +86,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -112,6 +116,7 @@ def self.openapi_types :'password_length' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -193,6 +198,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -274,6 +285,7 @@ def ==(o) password_length == o.password_length && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_ssh.rb b/lib/akeyless/models/rotated_secret_create_ssh.rb index 9aaa18db..173d750f 100644 --- a/lib/akeyless/models/rotated_secret_create_ssh.rb +++ b/lib/akeyless/models/rotated_secret_create_ssh.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateSsh # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -114,6 +117,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_custom_cmd' => :'rotator-custom-cmd', @@ -153,6 +157,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_custom_cmd' => :'String', @@ -249,6 +254,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -371,6 +382,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_custom_cmd == o.rotator_custom_cmd && @@ -398,7 +410,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_create_windows.rb b/lib/akeyless/models/rotated_secret_create_windows.rb index c250a02f..b8458693 100644 --- a/lib/akeyless/models/rotated_secret_create_windows.rb +++ b/lib/akeyless/models/rotated_secret_create_windows.rb @@ -51,6 +51,9 @@ class RotatedSecretCreateWindows # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -105,6 +108,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -141,6 +145,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -234,6 +239,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -344,6 +355,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -368,7 +380,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token].hash + [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_aws.rb b/lib/akeyless/models/rotated_secret_update_aws.rb index c87a646c..64726334 100644 --- a/lib/akeyless/models/rotated_secret_update_aws.rb +++ b/lib/akeyless/models/rotated_secret_update_aws.rb @@ -69,6 +69,9 @@ class RotatedSecretUpdateAws # Rotate the value of the secret after SRA session ends [true/false] attr_accessor :rotate_after_disconnect + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -114,6 +117,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rm_tag' => :'rm-tag', :'rotate_after_disconnect' => :'rotate-after-disconnect', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_aws_account_id' => :'secure-access-aws-account-id', @@ -151,6 +155,7 @@ def self.openapi_types :'password_length' => :'String', :'rm_tag' => :'Array', :'rotate_after_disconnect' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_aws_account_id' => :'String', @@ -271,6 +276,12 @@ def initialize(attributes = {}) self.rotate_after_disconnect = 'false' end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -347,6 +358,7 @@ def ==(o) password_length == o.password_length && rm_tag == o.rm_tag && rotate_after_disconnect == o.rotate_after_disconnect && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_aws_account_id == o.secure_access_aws_account_id && @@ -366,7 +378,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, api_id, api_key, authentication_credentials, auto_rotate, aws_region, delete_protection, description, grace_rotation, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_hour, rotation_interval, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_enable, token, uid_token].hash + [add_tag, api_id, api_key, authentication_credentials, auto_rotate, aws_region, delete_protection, description, grace_rotation, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_enable, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_azure.rb b/lib/akeyless/models/rotated_secret_update_azure.rb index 3e9065cc..3793f326 100644 --- a/lib/akeyless/models/rotated_secret_update_azure.rb +++ b/lib/akeyless/models/rotated_secret_update_azure.rb @@ -66,6 +66,9 @@ class RotatedSecretUpdateAzure # Rotate the value of the secret after SRA session ends [true/false] attr_accessor :rotate_after_disconnect + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -122,6 +125,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rm_tag' => :'rm-tag', :'rotate_after_disconnect' => :'rotate-after-disconnect', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_disable_concurrent_connections' => :'secure-access-disable-concurrent-connections', @@ -162,6 +166,7 @@ def self.openapi_types :'password_length' => :'String', :'rm_tag' => :'Array', :'rotate_after_disconnect' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_disable_concurrent_connections' => :'Boolean', @@ -280,6 +285,12 @@ def initialize(attributes = {}) self.rotate_after_disconnect = 'false' end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -377,6 +388,7 @@ def ==(o) password_length == o.password_length && rm_tag == o.rm_tag && rotate_after_disconnect == o.rotate_after_disconnect && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_disable_concurrent_connections == o.secure_access_disable_concurrent_connections && @@ -400,7 +412,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, api_id, api_key, application_id, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_hour, rotation_interval, secure_access_disable_concurrent_connections, secure_access_enable, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, storage_account_key_name, token, uid_token, username].hash + [add_tag, api_id, api_key, application_id, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, secure_access_disable_concurrent_connections, secure_access_enable, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, storage_account_key_name, token, uid_token, username].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_cassandra.rb b/lib/akeyless/models/rotated_secret_update_cassandra.rb index 1247cb84..34db195c 100644 --- a/lib/akeyless/models/rotated_secret_update_cassandra.rb +++ b/lib/akeyless/models/rotated_secret_update_cassandra.rb @@ -60,6 +60,9 @@ class RotatedSecretUpdateCassandra # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -90,6 +93,7 @@ def self.attribute_map :'rm_tag' => :'rm-tag', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'token' => :'token', @@ -120,6 +124,7 @@ def self.openapi_types :'rm_tag' => :'Array', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'token' => :'String', @@ -220,6 +225,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -277,6 +288,7 @@ def ==(o) rm_tag == o.rm_tag && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && token == o.token && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_hour, rotation_interval, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_custom.rb b/lib/akeyless/models/rotated_secret_update_custom.rb index a1ed4602..5a8f73ac 100644 --- a/lib/akeyless/models/rotated_secret_update_custom.rb +++ b/lib/akeyless/models/rotated_secret_update_custom.rb @@ -60,6 +60,9 @@ class RotatedSecretUpdateCustom # Rotate the value of the secret after SRA session ends [true/false] attr_accessor :rotate_after_disconnect + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -126,6 +129,7 @@ def self.attribute_map :'password_length' => :'password-length', :'rm_tag' => :'rm-tag', :'rotate_after_disconnect' => :'rotate-after-disconnect', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_allow_external_user' => :'secure-access-allow-external-user', @@ -168,6 +172,7 @@ def self.openapi_types :'password_length' => :'String', :'rm_tag' => :'Array', :'rotate_after_disconnect' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_allow_external_user' => :'Boolean', @@ -282,6 +287,12 @@ def initialize(attributes = {}) self.rotate_after_disconnect = 'false' end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -397,6 +408,7 @@ def ==(o) password_length == o.password_length && rm_tag == o.rm_tag && rotate_after_disconnect == o.rotate_after_disconnect && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_allow_external_user == o.secure_access_allow_external_user && @@ -424,7 +436,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, custom_payload, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_hour, rotation_interval, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, timeout_sec, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, custom_payload, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, timeout_sec, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_dockerhub.rb b/lib/akeyless/models/rotated_secret_update_dockerhub.rb index 6f1df6b3..88908b9e 100644 --- a/lib/akeyless/models/rotated_secret_update_dockerhub.rb +++ b/lib/akeyless/models/rotated_secret_update_dockerhub.rb @@ -54,6 +54,9 @@ class RotatedSecretUpdateDockerhub # List of the existent tags that will be removed from this item attr_accessor :rm_tag + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -82,6 +85,7 @@ def self.attribute_map :'new_name' => :'new-name', :'password_length' => :'password-length', :'rm_tag' => :'rm-tag', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'token' => :'token', @@ -110,6 +114,7 @@ def self.openapi_types :'new_name' => :'String', :'password_length' => :'String', :'rm_tag' => :'Array', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'token' => :'String', @@ -202,6 +207,12 @@ def initialize(attributes = {}) end end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -257,6 +268,7 @@ def ==(o) new_name == o.new_name && password_length == o.password_length && rm_tag == o.rm_tag && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && token == o.token && @@ -272,7 +284,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotation_hour, rotation_interval, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotation_event_in, rotation_hour, rotation_interval, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_gcp.rb b/lib/akeyless/models/rotated_secret_update_gcp.rb index bde5b981..120c6a6d 100644 --- a/lib/akeyless/models/rotated_secret_update_gcp.rb +++ b/lib/akeyless/models/rotated_secret_update_gcp.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateGcp # List of the existent tags that will be removed from this item attr_accessor :rm_tag + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -97,6 +100,7 @@ def self.attribute_map :'new_name' => :'new-name', :'password_length' => :'password-length', :'rm_tag' => :'rm-tag', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -129,6 +133,7 @@ def self.openapi_types :'new_name' => :'String', :'password_length' => :'String', :'rm_tag' => :'Array', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -234,6 +239,12 @@ def initialize(attributes = {}) end end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -303,6 +314,7 @@ def ==(o) new_name == o.new_name && password_length == o.password_length && rm_tag == o.rm_tag && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -319,7 +331,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, gcp_key, gcp_service_account_email, gcp_service_account_key_id, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotation_hour, rotation_interval, rotator_type, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, gcp_key, gcp_service_account_email, gcp_service_account_key_id, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotation_event_in, rotation_hour, rotation_interval, rotator_type, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_hanadb.rb b/lib/akeyless/models/rotated_secret_update_hanadb.rb index 83c04b39..5ecede6f 100644 --- a/lib/akeyless/models/rotated_secret_update_hanadb.rb +++ b/lib/akeyless/models/rotated_secret_update_hanadb.rb @@ -60,6 +60,9 @@ class RotatedSecretUpdateHanadb # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -90,6 +93,7 @@ def self.attribute_map :'rm_tag' => :'rm-tag', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'token' => :'token', @@ -120,6 +124,7 @@ def self.openapi_types :'rm_tag' => :'Array', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'token' => :'String', @@ -220,6 +225,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -277,6 +288,7 @@ def ==(o) rm_tag == o.rm_tag && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && token == o.token && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_hour, rotation_interval, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_ldap.rb b/lib/akeyless/models/rotated_secret_update_ldap.rb index 1afedddd..5a8e9bee 100644 --- a/lib/akeyless/models/rotated_secret_update_ldap.rb +++ b/lib/akeyless/models/rotated_secret_update_ldap.rb @@ -68,6 +68,9 @@ class RotatedSecretUpdateLdap # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -131,6 +134,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_enable' => :'secure-access-enable', @@ -174,6 +178,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_enable' => :'String', @@ -298,6 +303,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -410,6 +421,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_enable == o.secure_access_enable && @@ -435,7 +447,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash + [provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_mongodb.rb b/lib/akeyless/models/rotated_secret_update_mongodb.rb index 6a1aa6a1..a07af3dc 100644 --- a/lib/akeyless/models/rotated_secret_update_mongodb.rb +++ b/lib/akeyless/models/rotated_secret_update_mongodb.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateMongodb # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -109,6 +112,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer', @@ -145,6 +149,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_bastion_issuer' => :'String', @@ -256,6 +261,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -338,6 +349,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_bastion_issuer == o.secure_access_bastion_issuer && @@ -358,7 +370,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_mssql.rb b/lib/akeyless/models/rotated_secret_update_mssql.rb index 043024fa..4e2381a0 100644 --- a/lib/akeyless/models/rotated_secret_update_mssql.rb +++ b/lib/akeyless/models/rotated_secret_update_mssql.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateMssql # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -112,6 +115,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer', @@ -149,6 +153,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_bastion_issuer' => :'String', @@ -261,6 +266,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -347,6 +358,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_bastion_issuer == o.secure_access_bastion_issuer && @@ -368,7 +380,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_mysql.rb b/lib/akeyless/models/rotated_secret_update_mysql.rb index 687a30c3..3eb141b0 100644 --- a/lib/akeyless/models/rotated_secret_update_mysql.rb +++ b/lib/akeyless/models/rotated_secret_update_mysql.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateMysql # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -109,6 +112,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer', @@ -145,6 +149,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_bastion_issuer' => :'String', @@ -256,6 +261,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -338,6 +349,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_bastion_issuer == o.secure_access_bastion_issuer && @@ -358,7 +370,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_oracledb.rb b/lib/akeyless/models/rotated_secret_update_oracledb.rb index 2accd722..98a8f776 100644 --- a/lib/akeyless/models/rotated_secret_update_oracledb.rb +++ b/lib/akeyless/models/rotated_secret_update_oracledb.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateOracledb # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -106,6 +109,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_db_name' => :'secure-access-db-name', @@ -141,6 +145,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_db_name' => :'String', @@ -251,6 +256,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -329,6 +340,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_db_name == o.secure_access_db_name && @@ -348,7 +360,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_postgresql.rb b/lib/akeyless/models/rotated_secret_update_postgresql.rb index a36ca644..574cf09a 100644 --- a/lib/akeyless/models/rotated_secret_update_postgresql.rb +++ b/lib/akeyless/models/rotated_secret_update_postgresql.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdatePostgresql # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -112,6 +115,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer', @@ -149,6 +153,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_bastion_issuer' => :'String', @@ -261,6 +266,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -347,6 +358,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_bastion_issuer == o.secure_access_bastion_issuer && @@ -368,7 +380,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_redis.rb b/lib/akeyless/models/rotated_secret_update_redis.rb index 0bab28aa..23a222eb 100644 --- a/lib/akeyless/models/rotated_secret_update_redis.rb +++ b/lib/akeyless/models/rotated_secret_update_redis.rb @@ -60,6 +60,9 @@ class RotatedSecretUpdateRedis # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -90,6 +93,7 @@ def self.attribute_map :'rm_tag' => :'rm-tag', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'token' => :'token', @@ -120,6 +124,7 @@ def self.openapi_types :'rm_tag' => :'Array', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'token' => :'String', @@ -220,6 +225,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -277,6 +288,7 @@ def ==(o) rm_tag == o.rm_tag && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && token == o.token && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_hour, rotation_interval, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_redshift.rb b/lib/akeyless/models/rotated_secret_update_redshift.rb index 9d2c9bd5..3033ec62 100644 --- a/lib/akeyless/models/rotated_secret_update_redshift.rb +++ b/lib/akeyless/models/rotated_secret_update_redshift.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateRedshift # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -103,6 +106,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'secure_access_db_name' => :'secure-access-db-name', @@ -137,6 +141,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'secure_access_db_name' => :'String', @@ -246,6 +251,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -318,6 +329,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && secure_access_db_name == o.secure_access_db_name && @@ -336,7 +348,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_snowflake.rb b/lib/akeyless/models/rotated_secret_update_snowflake.rb index cfd64995..412cf1cc 100644 --- a/lib/akeyless/models/rotated_secret_update_snowflake.rb +++ b/lib/akeyless/models/rotated_secret_update_snowflake.rb @@ -60,6 +60,9 @@ class RotatedSecretUpdateSnowflake # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -90,6 +93,7 @@ def self.attribute_map :'rm_tag' => :'rm-tag', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'token' => :'token', @@ -120,6 +124,7 @@ def self.openapi_types :'rm_tag' => :'Array', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'token' => :'String', @@ -220,6 +225,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -277,6 +288,7 @@ def ==(o) rm_tag == o.rm_tag && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && token == o.token && @@ -292,7 +304,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_hour, rotation_interval, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_ssh.rb b/lib/akeyless/models/rotated_secret_update_ssh.rb index 5b77f233..5cb2ac80 100644 --- a/lib/akeyless/models/rotated_secret_update_ssh.rb +++ b/lib/akeyless/models/rotated_secret_update_ssh.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateSsh # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -124,6 +127,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_custom_cmd' => :'rotator-custom-cmd', @@ -165,6 +169,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_custom_cmd' => :'String', @@ -281,6 +286,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -390,6 +401,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_custom_cmd == o.rotator_custom_cmd && @@ -415,7 +427,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/rotated_secret_update_windows.rb b/lib/akeyless/models/rotated_secret_update_windows.rb index 1a373aaf..c39a5bc0 100644 --- a/lib/akeyless/models/rotated_secret_update_windows.rb +++ b/lib/akeyless/models/rotated_secret_update_windows.rb @@ -63,6 +63,9 @@ class RotatedSecretUpdateWindows # username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) attr_accessor :rotated_username + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The Hour of the rotation in UTC attr_accessor :rotation_hour @@ -115,6 +118,7 @@ def self.attribute_map :'rotate_after_disconnect' => :'rotate-after-disconnect', :'rotated_password' => :'rotated-password', :'rotated_username' => :'rotated-username', + :'rotation_event_in' => :'rotation-event-in', :'rotation_hour' => :'rotation-hour', :'rotation_interval' => :'rotation-interval', :'rotator_type' => :'rotator-type', @@ -153,6 +157,7 @@ def self.openapi_types :'rotate_after_disconnect' => :'String', :'rotated_password' => :'String', :'rotated_username' => :'String', + :'rotation_event_in' => :'Array', :'rotation_hour' => :'Integer', :'rotation_interval' => :'String', :'rotator_type' => :'String', @@ -266,6 +271,12 @@ def initialize(attributes = {}) self.rotated_username = attributes[:'rotated_username'] end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_hour') self.rotation_hour = attributes[:'rotation_hour'] end @@ -363,6 +374,7 @@ def ==(o) rotate_after_disconnect == o.rotate_after_disconnect && rotated_password == o.rotated_password && rotated_username == o.rotated_username && + rotation_event_in == o.rotation_event_in && rotation_hour == o.rotation_hour && rotation_interval == o.rotation_interval && rotator_type == o.rotator_type && @@ -385,7 +397,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, token, uid_token].hash + [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/ssh_bastion_conf.rb b/lib/akeyless/models/ssh_bastion_conf.rb new file mode 100644 index 00000000..f4dd088c --- /dev/null +++ b/lib/akeyless/models/ssh_bastion_conf.rb @@ -0,0 +1,241 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class SshBastionConf + attr_accessor :hide_session_recording + + attr_accessor :kexalgs + + attr_accessor :log_forwarding + + attr_accessor :session_termination + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'hide_session_recording' => :'hide_session_recording', + :'kexalgs' => :'kexalgs', + :'log_forwarding' => :'log_forwarding', + :'session_termination' => :'session_termination' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'hide_session_recording' => :'Boolean', + :'kexalgs' => :'String', + :'log_forwarding' => :'LogForwardingConfigPart', + :'session_termination' => :'SshBastionSessionTermination' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::SshBastionConf` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::SshBastionConf`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'hide_session_recording') + self.hide_session_recording = attributes[:'hide_session_recording'] + end + + if attributes.key?(:'kexalgs') + self.kexalgs = attributes[:'kexalgs'] + end + + if attributes.key?(:'log_forwarding') + self.log_forwarding = attributes[:'log_forwarding'] + end + + if attributes.key?(:'session_termination') + self.session_termination = attributes[:'session_termination'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + hide_session_recording == o.hide_session_recording && + kexalgs == o.kexalgs && + log_forwarding == o.log_forwarding && + session_termination == o.session_termination + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [hide_session_recording, kexalgs, log_forwarding, session_termination].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/ssh_bastion_session_termination.rb b/lib/akeyless/models/ssh_bastion_session_termination.rb new file mode 100644 index 00000000..e3e3f0ae --- /dev/null +++ b/lib/akeyless/models/ssh_bastion_session_termination.rb @@ -0,0 +1,250 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class SshBastionSessionTermination + attr_accessor :api_password + + attr_accessor :api_token + + attr_accessor :api_url + + attr_accessor :api_username + + attr_accessor :enabled + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'api_password' => :'api_password', + :'api_token' => :'api_token', + :'api_url' => :'api_url', + :'api_username' => :'api_username', + :'enabled' => :'enabled' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'api_password' => :'String', + :'api_token' => :'String', + :'api_url' => :'String', + :'api_username' => :'String', + :'enabled' => :'Boolean' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::SshBastionSessionTermination` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::SshBastionSessionTermination`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'api_password') + self.api_password = attributes[:'api_password'] + end + + if attributes.key?(:'api_token') + self.api_token = attributes[:'api_token'] + end + + if attributes.key?(:'api_url') + self.api_url = attributes[:'api_url'] + end + + if attributes.key?(:'api_username') + self.api_username = attributes[:'api_username'] + end + + if attributes.key?(:'enabled') + self.enabled = attributes[:'enabled'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + api_password == o.api_password && + api_token == o.api_token && + api_url == o.api_url && + api_username == o.api_username && + enabled == o.enabled + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [api_password, api_token, api_url, api_username, enabled].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/update_account_settings.rb b/lib/akeyless/models/update_account_settings.rb index cb056fba..6e5ff6d5 100644 --- a/lib/akeyless/models/update_account_settings.rb +++ b/lib/akeyless/models/update_account_settings.rb @@ -51,6 +51,9 @@ class UpdateAccountSettings # Enable sharing items [true/false] attr_accessor :enable_item_sharing + # Enable password expiration policy [true/false] + attr_accessor :enable_password_expiration + # If set to true, new version will be created on update attr_accessor :force_new_versions @@ -96,6 +99,12 @@ class UpdateAccountSettings # Max versions attr_accessor :max_versions + # Specifies the number of days that a password is valid before it must be changed. A default value of 90 days is used. + attr_accessor :password_expiration_days + + # Specifies the number of days before a user receives notification that their password will expire. A default value of 14 days is used. + attr_accessor :password_expiration_notification_days + # Password length between 5 - to 50 characters attr_accessor :password_length @@ -147,6 +156,7 @@ def self.attribute_map :'dynamic_secret_max_ttl' => :'dynamic-secret-max-ttl', :'dynamic_secret_max_ttl_enable' => :'dynamic-secret-max-ttl-enable', :'enable_item_sharing' => :'enable-item-sharing', + :'enable_password_expiration' => :'enable-password-expiration', :'force_new_versions' => :'force-new-versions', :'gw_bound_ips' => :'gw-bound-ips', :'invalid_characters' => :'invalid-characters', @@ -162,6 +172,8 @@ def self.attribute_map :'max_rotation_interval' => :'max-rotation-interval', :'max_rotation_interval_enable' => :'max-rotation-interval-enable', :'max_versions' => :'max-versions', + :'password_expiration_days' => :'password-expiration-days', + :'password_expiration_notification_days' => :'password-expiration-notification-days', :'password_length' => :'password-length', :'phone' => :'phone', :'postal_code' => :'postal-code', @@ -197,6 +209,7 @@ def self.openapi_types :'dynamic_secret_max_ttl' => :'Integer', :'dynamic_secret_max_ttl_enable' => :'String', :'enable_item_sharing' => :'String', + :'enable_password_expiration' => :'String', :'force_new_versions' => :'String', :'gw_bound_ips' => :'Array', :'invalid_characters' => :'String', @@ -212,6 +225,8 @@ def self.openapi_types :'max_rotation_interval' => :'Integer', :'max_rotation_interval_enable' => :'String', :'max_versions' => :'String', + :'password_expiration_days' => :'String', + :'password_expiration_notification_days' => :'String', :'password_length' => :'Integer', :'phone' => :'String', :'postal_code' => :'String', @@ -298,6 +313,10 @@ def initialize(attributes = {}) self.enable_item_sharing = attributes[:'enable_item_sharing'] end + if attributes.key?(:'enable_password_expiration') + self.enable_password_expiration = attributes[:'enable_password_expiration'] + end + if attributes.key?(:'force_new_versions') self.force_new_versions = attributes[:'force_new_versions'] end @@ -364,6 +383,14 @@ def initialize(attributes = {}) self.max_versions = attributes[:'max_versions'] end + if attributes.key?(:'password_expiration_days') + self.password_expiration_days = attributes[:'password_expiration_days'] + end + + if attributes.key?(:'password_expiration_notification_days') + self.password_expiration_notification_days = attributes[:'password_expiration_notification_days'] + end + if attributes.key?(:'password_length') self.password_length = attributes[:'password_length'] end @@ -445,6 +472,7 @@ def ==(o) dynamic_secret_max_ttl == o.dynamic_secret_max_ttl && dynamic_secret_max_ttl_enable == o.dynamic_secret_max_ttl_enable && enable_item_sharing == o.enable_item_sharing && + enable_password_expiration == o.enable_password_expiration && force_new_versions == o.force_new_versions && gw_bound_ips == o.gw_bound_ips && invalid_characters == o.invalid_characters && @@ -460,6 +488,8 @@ def ==(o) max_rotation_interval == o.max_rotation_interval && max_rotation_interval_enable == o.max_rotation_interval_enable && max_versions == o.max_versions && + password_expiration_days == o.password_expiration_days && + password_expiration_notification_days == o.password_expiration_notification_days && password_length == o.password_length && phone == o.phone && postal_code == o.postal_code && @@ -483,7 +513,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [address, bound_ips, city, company_name, country, default_key_name, default_share_link_ttl_minutes, default_versioning, dp_enable_classic_key_protection, dynamic_secret_max_ttl, dynamic_secret_max_ttl_enable, enable_item_sharing, force_new_versions, gw_bound_ips, invalid_characters, item_type, items_deletion_protection, json, jwt_ttl_default, jwt_ttl_max, jwt_ttl_min, lock_bound_ips, lock_default_key, lock_gw_bound_ips, max_rotation_interval, max_rotation_interval_enable, max_versions, password_length, phone, postal_code, token, uid_token, usage_event_enable, usage_event_interval, usage_event_object_type, use_lower_letters, use_numbers, use_special_characters, use_capital_letters].hash + [address, bound_ips, city, company_name, country, default_key_name, default_share_link_ttl_minutes, default_versioning, dp_enable_classic_key_protection, dynamic_secret_max_ttl, dynamic_secret_max_ttl_enable, enable_item_sharing, enable_password_expiration, force_new_versions, gw_bound_ips, invalid_characters, item_type, items_deletion_protection, json, jwt_ttl_default, jwt_ttl_max, jwt_ttl_min, lock_bound_ips, lock_default_key, lock_gw_bound_ips, max_rotation_interval, max_rotation_interval_enable, max_versions, password_expiration_days, password_expiration_notification_days, password_length, phone, postal_code, token, uid_token, usage_event_enable, usage_event_interval, usage_event_object_type, use_lower_letters, use_numbers, use_special_characters, use_capital_letters].hash end # Builds the object from hash diff --git a/lib/akeyless/models/update_item.rb b/lib/akeyless/models/update_item.rb index c591d7db..26c429ef 100644 --- a/lib/akeyless/models/update_item.rb +++ b/lib/akeyless/models/update_item.rb @@ -35,6 +35,9 @@ class UpdateItem # Description of the object attr_accessor :description + # How many days before the expiration of the certificate would you like to be notified. + attr_accessor :expiration_event_in + # Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret attr_accessor :host_provider @@ -150,6 +153,7 @@ def self.attribute_map :'change_event' => :'change-event', :'delete_protection' => :'delete_protection', :'description' => :'description', + :'expiration_event_in' => :'expiration-event-in', :'host_provider' => :'host-provider', :'json' => :'json', :'max_versions' => :'max-versions', @@ -203,6 +207,7 @@ def self.openapi_types :'change_event' => :'String', :'delete_protection' => :'String', :'description' => :'String', + :'expiration_event_in' => :'Array', :'host_provider' => :'String', :'json' => :'Boolean', :'max_versions' => :'String', @@ -296,6 +301,12 @@ def initialize(attributes = {}) self.description = 'default_metadata' end + if attributes.key?(:'expiration_event_in') + if (value = attributes[:'expiration_event_in']).is_a?(Array) + self.expiration_event_in = value + end + end + if attributes.key?(:'host_provider') self.host_provider = attributes[:'host_provider'] end @@ -489,6 +500,7 @@ def ==(o) change_event == o.change_event && delete_protection == o.delete_protection && description == o.description && + expiration_event_in == o.expiration_event_in && host_provider == o.host_provider && json == o.json && max_versions == o.max_versions && @@ -535,7 +547,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [provider_type, accessibility, add_tag, cert_file_data, change_event, delete_protection, description, host_provider, json, max_versions, name, new_metadata, new_name, rm_tag, rotate_after_disconnect, secure_access_add_host, secure_access_allow_external_user, secure_access_allow_port_forwading, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_aws_region, secure_access_bastion_api, secure_access_bastion_issuer, secure_access_bastion_ssh, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, secure_access_rm_host, secure_access_ssh_creds, secure_access_ssh_creds_user, secure_access_url, secure_access_use_internal_bastion, secure_access_web_browsing, secure_access_web_proxy, token, uid_token].hash + [provider_type, accessibility, add_tag, cert_file_data, change_event, delete_protection, description, expiration_event_in, host_provider, json, max_versions, name, new_metadata, new_name, rm_tag, rotate_after_disconnect, secure_access_add_host, secure_access_allow_external_user, secure_access_allow_port_forwading, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_aws_region, secure_access_bastion_api, secure_access_bastion_issuer, secure_access_bastion_ssh, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, secure_access_rm_host, secure_access_ssh_creds, secure_access_ssh_creds_user, secure_access_url, secure_access_use_internal_bastion, secure_access_web_browsing, secure_access_web_proxy, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/update_rotation_settings.rb b/lib/akeyless/models/update_rotation_settings.rb index 10d33b8e..cff7629e 100644 --- a/lib/akeyless/models/update_rotation_settings.rb +++ b/lib/akeyless/models/update_rotation_settings.rb @@ -25,6 +25,9 @@ class UpdateRotationSettings # Key name attr_accessor :name + # How many days before the rotation of the item would you like to be notified + attr_accessor :rotation_event_in + # The number of days to wait between every automatic key rotation (7-365) attr_accessor :rotation_interval @@ -40,6 +43,7 @@ def self.attribute_map :'auto_rotate' => :'auto-rotate', :'json' => :'json', :'name' => :'name', + :'rotation_event_in' => :'rotation-event-in', :'rotation_interval' => :'rotation-interval', :'token' => :'token', :'uid_token' => :'uid-token' @@ -57,6 +61,7 @@ def self.openapi_types :'auto_rotate' => :'Boolean', :'json' => :'Boolean', :'name' => :'String', + :'rotation_event_in' => :'Array', :'rotation_interval' => :'Integer', :'token' => :'String', :'uid_token' => :'String' @@ -102,6 +107,12 @@ def initialize(attributes = {}) self.name = nil end + if attributes.key?(:'rotation_event_in') + if (value = attributes[:'rotation_event_in']).is_a?(Array) + self.rotation_event_in = value + end + end + if attributes.key?(:'rotation_interval') self.rotation_interval = attributes[:'rotation_interval'] end @@ -148,6 +159,7 @@ def ==(o) auto_rotate == o.auto_rotate && json == o.json && name == o.name && + rotation_event_in == o.rotation_event_in && rotation_interval == o.rotation_interval && token == o.token && uid_token == o.uid_token @@ -162,7 +174,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [auto_rotate, json, name, rotation_interval, token, uid_token].hash + [auto_rotate, json, name, rotation_event_in, rotation_interval, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/update_target.rb b/lib/akeyless/models/update_target.rb index 9ee3162f..67c9fd48 100644 --- a/lib/akeyless/models/update_target.rb +++ b/lib/akeyless/models/update_target.rb @@ -30,7 +30,7 @@ class UpdateTarget # Deprecated - use description attr_accessor :new_comment - # New Target name + # New target name attr_accessor :new_name # Authentication token (see `/auth` and `/configure`) diff --git a/lib/akeyless/models/upload_rsa.rb b/lib/akeyless/models/upload_rsa.rb index c383136d..a7325bfc 100644 --- a/lib/akeyless/models/upload_rsa.rb +++ b/lib/akeyless/models/upload_rsa.rb @@ -32,6 +32,9 @@ class UploadRSA # Description of the object attr_accessor :description + # How many days before the expiration of the certificate would you like to be notified. + attr_accessor :expiration_event_in + # Set output format to JSON attr_accessor :json @@ -68,6 +71,7 @@ def self.attribute_map :'customer_frg_id' => :'customer-frg-id', :'delete_protection' => :'delete_protection', :'description' => :'description', + :'expiration_event_in' => :'expiration-event-in', :'json' => :'json', :'metadata' => :'metadata', :'name' => :'name', @@ -94,6 +98,7 @@ def self.openapi_types :'customer_frg_id' => :'String', :'delete_protection' => :'String', :'description' => :'String', + :'expiration_event_in' => :'Array', :'json' => :'Boolean', :'metadata' => :'String', :'name' => :'String', @@ -153,6 +158,12 @@ def initialize(attributes = {}) self.description = attributes[:'description'] end + if attributes.key?(:'expiration_event_in') + if (value = attributes[:'expiration_event_in']).is_a?(Array) + self.expiration_event_in = value + end + end + if attributes.key?(:'json') self.json = attributes[:'json'] else @@ -236,6 +247,7 @@ def ==(o) customer_frg_id == o.customer_frg_id && delete_protection == o.delete_protection && description == o.description && + expiration_event_in == o.expiration_event_in && json == o.json && metadata == o.metadata && name == o.name && @@ -256,7 +268,7 @@ def eql?(o) # Calculates hash code according to all attributes. # @return [Integer] Hash code def hash - [alg, cert_file_data, certificate_format, customer_frg_id, delete_protection, description, json, metadata, name, overwrite, rsa_file_data, split_level, tag, token, uid_token].hash + [alg, cert_file_data, certificate_format, customer_frg_id, delete_protection, description, expiration_event_in, json, metadata, name, overwrite, rsa_file_data, split_level, tag, token, uid_token].hash end # Builds the object from hash diff --git a/lib/akeyless/models/web_bastion_conf.rb b/lib/akeyless/models/web_bastion_conf.rb new file mode 100644 index 00000000..366a6523 --- /dev/null +++ b/lib/akeyless/models/web_bastion_conf.rb @@ -0,0 +1,223 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class WebBastionConf + attr_accessor :guacamole + + attr_accessor :rdp_record + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'guacamole' => :'guacamole', + :'rdp_record' => :'rdp_record' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'guacamole' => :'WebBastionGuacamole', + :'rdp_record' => :'WebBastionRdpRecord' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::WebBastionConf` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::WebBastionConf`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'guacamole') + self.guacamole = attributes[:'guacamole'] + end + + if attributes.key?(:'rdp_record') + self.rdp_record = attributes[:'rdp_record'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + guacamole == o.guacamole && + rdp_record == o.rdp_record + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [guacamole, rdp_record].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/web_bastion_guacamole.rb b/lib/akeyless/models/web_bastion_guacamole.rb new file mode 100644 index 00000000..fe9c3359 --- /dev/null +++ b/lib/akeyless/models/web_bastion_guacamole.rb @@ -0,0 +1,214 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class WebBastionGuacamole + attr_accessor :keyboard_layout + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'keyboard_layout' => :'keyboard_layout' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'keyboard_layout' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::WebBastionGuacamole` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::WebBastionGuacamole`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'keyboard_layout') + self.keyboard_layout = attributes[:'keyboard_layout'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + keyboard_layout == o.keyboard_layout + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [keyboard_layout].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/models/web_bastion_rdp_record.rb b/lib/akeyless/models/web_bastion_rdp_record.rb new file mode 100644 index 00000000..3e3ffb4b --- /dev/null +++ b/lib/akeyless/models/web_bastion_rdp_record.rb @@ -0,0 +1,232 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'date' +require 'time' + +module Akeyless + class WebBastionRdpRecord + attr_accessor :aws + + attr_accessor :azure + + attr_accessor :storage_type + + # Attribute mapping from ruby-style variable name to JSON key. + def self.attribute_map + { + :'aws' => :'aws', + :'azure' => :'azure', + :'storage_type' => :'storage_type' + } + end + + # Returns all the JSON keys this model knows about + def self.acceptable_attributes + attribute_map.values + end + + # Attribute type mapping. + def self.openapi_types + { + :'aws' => :'AwsStorage', + :'azure' => :'AzureStorage', + :'storage_type' => :'String' + } + end + + # List of attributes with nullable: true + def self.openapi_nullable + Set.new([ + ]) + end + + # Initializes the object + # @param [Hash] attributes Model attributes in the form of hash + def initialize(attributes = {}) + if (!attributes.is_a?(Hash)) + fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::WebBastionRdpRecord` initialize method" + end + + # check to see if the attribute exists and convert string to symbol for hash key + attributes = attributes.each_with_object({}) { |(k, v), h| + if (!self.class.attribute_map.key?(k.to_sym)) + fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::WebBastionRdpRecord`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect + end + h[k.to_sym] = v + } + + if attributes.key?(:'aws') + self.aws = attributes[:'aws'] + end + + if attributes.key?(:'azure') + self.azure = attributes[:'azure'] + end + + if attributes.key?(:'storage_type') + self.storage_type = attributes[:'storage_type'] + end + end + + # Show invalid properties with the reasons. Usually used together with valid? + # @return Array for valid properties with the reasons + def list_invalid_properties + warn '[DEPRECATED] the `list_invalid_properties` method is obsolete' + invalid_properties = Array.new + invalid_properties + end + + # Check to see if the all the properties in the model are valid + # @return true if the model is valid + def valid? + warn '[DEPRECATED] the `valid?` method is obsolete' + true + end + + # Checks equality by comparing each attribute. + # @param [Object] Object to be compared + def ==(o) + return true if self.equal?(o) + self.class == o.class && + aws == o.aws && + azure == o.azure && + storage_type == o.storage_type + end + + # @see the `==` method + # @param [Object] Object to be compared + def eql?(o) + self == o + end + + # Calculates hash code according to all attributes. + # @return [Integer] Hash code + def hash + [aws, azure, storage_type].hash + end + + # Builds the object from hash + # @param [Hash] attributes Model attributes in the form of hash + # @return [Object] Returns the model itself + def self.build_from_hash(attributes) + return nil unless attributes.is_a?(Hash) + attributes = attributes.transform_keys(&:to_sym) + transformed_hash = {} + openapi_types.each_pair do |key, type| + if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = nil + elsif type =~ /\AArray<(.*)>/i + # check to ensure the input is an array given that the attribute + # is documented as an array but the input is not + if attributes[attribute_map[key]].is_a?(Array) + transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) } + end + elsif !attributes[attribute_map[key]].nil? + transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]]) + end + end + new(transformed_hash) + end + + # Deserializes the data based on type + # @param string type Data type + # @param string value Value to be deserialized + # @return [Object] Deserialized data + def self._deserialize(type, value) + case type.to_sym + when :Time + Time.parse(value) + when :Date + Date.parse(value) + when :String + value.to_s + when :Integer + value.to_i + when :Float + value.to_f + when :Boolean + if value.to_s =~ /\A(true|t|yes|y|1)\z/i + true + else + false + end + when :Object + # generic object (usually a Hash), return directly + value + when /\AArray<(?.+)>\z/ + inner_type = Regexp.last_match[:inner_type] + value.map { |v| _deserialize(inner_type, v) } + when /\AHash<(?.+?), (?.+)>\z/ + k_type = Regexp.last_match[:k_type] + v_type = Regexp.last_match[:v_type] + {}.tap do |hash| + value.each do |k, v| + hash[_deserialize(k_type, k)] = _deserialize(v_type, v) + end + end + else # model + # models (e.g. Pet) or oneOf + klass = Akeyless.const_get(type) + klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value) + end + end + + # Returns the string representation of the object + # @return [String] String presentation of the object + def to_s + to_hash.to_s + end + + # to_body is an alias to to_hash (backward compatibility) + # @return [Hash] Returns the object in the form of hash + def to_body + to_hash + end + + # Returns the object in the form of hash + # @return [Hash] Returns the object in the form of hash + def to_hash + hash = {} + self.class.attribute_map.each_pair do |attr, param| + value = self.send(attr) + if value.nil? + is_nullable = self.class.openapi_nullable.include?(attr) + next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}")) + end + + hash[param] = _to_hash(value) + end + hash + end + + # Outputs non-array value in the form of hash + # For object, use to_hash. Otherwise, just return the value + # @param [Object] value Any valid value + # @return [Hash] Returns the value in the form of hash + def _to_hash(value) + if value.is_a?(Array) + value.compact.map { |v| _to_hash(v) } + elsif value.is_a?(Hash) + {}.tap do |hash| + value.each { |k, v| hash[k] = _to_hash(v) } + end + elsif value.respond_to? :to_hash + value.to_hash + else + value + end + end + + end + +end diff --git a/lib/akeyless/version.rb b/lib/akeyless/version.rb index ff35328d..8e666eae 100644 --- a/lib/akeyless/version.rb +++ b/lib/akeyless/version.rb @@ -11,5 +11,5 @@ =end module Akeyless - VERSION = '4.2.3' + VERSION = '4.2.4' end diff --git a/spec/models/aws_storage_spec.rb b/spec/models/aws_storage_spec.rb new file mode 100644 index 00000000..791f256d --- /dev/null +++ b/spec/models/aws_storage_spec.rb @@ -0,0 +1,66 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::AwsStorage +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::AwsStorage do + let(:instance) { Akeyless::AwsStorage.new } + + describe 'test an instance of AwsStorage' do + it 'should create an instance of AwsStorage' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::AwsStorage) + end + end + + describe 'test attribute "access_key_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "access_key_secret"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "auth_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "bucket"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "prefix"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "region"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/azure_storage_spec.rb b/spec/models/azure_storage_spec.rb new file mode 100644 index 00000000..e621b621 --- /dev/null +++ b/spec/models/azure_storage_spec.rb @@ -0,0 +1,66 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::AzureStorage +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::AzureStorage do + let(:instance) { Akeyless::AzureStorage.new } + + describe 'test an instance of AzureStorage' do + it 'should create an instance of AzureStorage' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::AzureStorage) + end + end + + describe 'test attribute "auth_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "client_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "client_secret"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "storage_account"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "storage_container_name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "tenant_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/bastion_config_reply_obj_spec.rb b/spec/models/bastion_config_reply_obj_spec.rb new file mode 100644 index 00000000..2c98e498 --- /dev/null +++ b/spec/models/bastion_config_reply_obj_spec.rb @@ -0,0 +1,66 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::BastionConfigReplyObj +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::BastionConfigReplyObj do + let(:instance) { Akeyless::BastionConfigReplyObj.new } + + describe 'test an instance of BastionConfigReplyObj' do + it 'should create an instance of BastionConfigReplyObj' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::BastionConfigReplyObj) + end + end + + describe 'test attribute "api_gateway_url"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "cluster_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "gator_cluster_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "global"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "ssh_bastion"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "web_bastion"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/bastion_global_conf_spec.rb b/spec/models/bastion_global_conf_spec.rb new file mode 100644 index 00000000..0f65a09d --- /dev/null +++ b/spec/models/bastion_global_conf_spec.rb @@ -0,0 +1,54 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::BastionGlobalConf +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::BastionGlobalConf do + let(:instance) { Akeyless::BastionGlobalConf.new } + + describe 'test an instance of BastionGlobalConf' do + it 'should create an instance of BastionGlobalConf' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::BastionGlobalConf) + end + end + + describe 'test attribute "allowed_bastion_urls"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "legacy_signing_alg"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "rdp_username_sub_claim"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "ssh_username_sub_claim"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gateway_get_remote_access_spec.rb b/spec/models/gateway_get_remote_access_spec.rb new file mode 100644 index 00000000..26e12dbe --- /dev/null +++ b/spec/models/gateway_get_remote_access_spec.rb @@ -0,0 +1,48 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GatewayGetRemoteAccess +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GatewayGetRemoteAccess do + let(:instance) { Akeyless::GatewayGetRemoteAccess.new } + + describe 'test an instance of GatewayGetRemoteAccess' do + it 'should create an instance of GatewayGetRemoteAccess' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GatewayGetRemoteAccess) + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb b/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb new file mode 100644 index 00000000..ca0a8704 --- /dev/null +++ b/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb @@ -0,0 +1,120 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GatewayUpdateRemoteAccessRdpRecordings +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GatewayUpdateRemoteAccessRdpRecordings do + let(:instance) { Akeyless::GatewayUpdateRemoteAccessRdpRecordings.new } + + describe 'test an instance of GatewayUpdateRemoteAccessRdpRecordings' do + it 'should create an instance of GatewayUpdateRemoteAccessRdpRecordings' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GatewayUpdateRemoteAccessRdpRecordings) + end + end + + describe 'test attribute "aws_storage_access_key_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "aws_storage_bucket_name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "aws_storage_bucket_prefix"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "aws_storage_region"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "aws_storage_secret_access_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "azure_storage_account_name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "azure_storage_client_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "azure_storage_client_secret"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "azure_storage_container_name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "azure_storage_tenant_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "rdp_session_recording"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "rdp_session_storage"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gateway_update_remote_access_spec.rb b/spec/models/gateway_update_remote_access_spec.rb new file mode 100644 index 00000000..eabb79d6 --- /dev/null +++ b/spec/models/gateway_update_remote_access_spec.rb @@ -0,0 +1,90 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GatewayUpdateRemoteAccess +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GatewayUpdateRemoteAccess do + let(:instance) { Akeyless::GatewayUpdateRemoteAccess.new } + + describe 'test an instance of GatewayUpdateRemoteAccess' do + it 'should create an instance of GatewayUpdateRemoteAccess' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GatewayUpdateRemoteAccess) + end + end + + describe 'test attribute "allowed_urls"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "hide_session_recording"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "kexalgs"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "keyboard_layout"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "legacy_ssh_algorithm"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "rdp_target_configuration"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "ssh_target_configuration"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb b/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb new file mode 100644 index 00000000..cf022416 --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb @@ -0,0 +1,108 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3 +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3 do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsAwsS3' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsAwsS3' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsAwsS3) + end + end + + describe 'test attribute "access_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "access_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "auth_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "bucket_name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "log_folder"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "region"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "role_arn"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb b/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb new file mode 100644 index 00000000..28dd688c --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb @@ -0,0 +1,78 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsAzureAnalytics' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsAzureAnalytics' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsAzureAnalytics) + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "workspace_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "workspace_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb b/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb new file mode 100644 index 00000000..bc4d6fae --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb @@ -0,0 +1,96 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsDatadog +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsDatadog do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsDatadog.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsDatadog' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsDatadog' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsDatadog) + end + end + + describe 'test attribute "api_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "host"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "log_service"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "log_source"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "log_tags"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb b/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb new file mode 100644 index 00000000..460f1b6f --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb @@ -0,0 +1,126 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsElasticsearch' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsElasticsearch' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsElasticsearch) + end + end + + describe 'test attribute "api_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "auth_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "cloud_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable_tls"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "index"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "nodes"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "password"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "server_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "tls_certificate"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "user_name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb b/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb new file mode 100644 index 00000000..f5a3e06a --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb @@ -0,0 +1,90 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsGoogleChronicle' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsGoogleChronicle' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsGoogleChronicle) + end + end + + describe 'test attribute "customer_id"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "gcp_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "log_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "region"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb b/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb new file mode 100644 index 00000000..23804db6 --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb @@ -0,0 +1,90 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsLogstash +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsLogstash do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsLogstash.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsLogstash' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsLogstash' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsLogstash) + end + end + + describe 'test attribute "dns"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable_tls"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "protocol"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "tls_certificate"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb b/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb new file mode 100644 index 00000000..ef0d6610 --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb @@ -0,0 +1,78 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsLogzIo' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsLogzIo' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsLogzIo) + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "logz_io_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "protocol"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb b/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb new file mode 100644 index 00000000..1adbbd70 --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb @@ -0,0 +1,108 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsSplunk +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsSplunk do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsSplunk.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsSplunk' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsSplunk' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsSplunk) + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable_tls"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "index"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "source"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "source_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "splunk_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "splunk_url"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "tls_certificate"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb b/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb new file mode 100644 index 00000000..9274ee4a --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb @@ -0,0 +1,66 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsStdout +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsStdout do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsStdout.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsStdout' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsStdout' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsStdout) + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb b/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb new file mode 100644 index 00000000..e0ac9a5c --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb @@ -0,0 +1,84 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsSumologic +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsSumologic do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsSumologic.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsSumologic' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsSumologic' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsSumologic) + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "endpoint"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "host"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "sumologic_tags"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb b/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb new file mode 100644 index 00000000..11b994e8 --- /dev/null +++ b/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb @@ -0,0 +1,102 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::GwUpdateRemoteAccessSessionLogsSyslog +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::GwUpdateRemoteAccessSessionLogsSyslog do + let(:instance) { Akeyless::GwUpdateRemoteAccessSessionLogsSyslog.new } + + describe 'test an instance of GwUpdateRemoteAccessSessionLogsSyslog' do + it 'should create an instance of GwUpdateRemoteAccessSessionLogsSyslog' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::GwUpdateRemoteAccessSessionLogsSyslog) + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable_tls"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "formatter"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "host"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "network"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "output_format"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "pull_interval"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "target_tag"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "tls_certificate"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/next_auto_rotation_event_spec.rb b/spec/models/next_auto_rotation_event_spec.rb new file mode 100644 index 00000000..cc2a0c0e --- /dev/null +++ b/spec/models/next_auto_rotation_event_spec.rb @@ -0,0 +1,36 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::NextAutoRotationEvent +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::NextAutoRotationEvent do + let(:instance) { Akeyless::NextAutoRotationEvent.new } + + describe 'test an instance of NextAutoRotationEvent' do + it 'should create an instance of NextAutoRotationEvent' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::NextAutoRotationEvent) + end + end + + describe 'test attribute "seconds_before"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/password_expiration_info_spec.rb b/spec/models/password_expiration_info_spec.rb new file mode 100644 index 00000000..4c5fa90a --- /dev/null +++ b/spec/models/password_expiration_info_spec.rb @@ -0,0 +1,54 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::PasswordExpirationInfo +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::PasswordExpirationInfo do + let(:instance) { Akeyless::PasswordExpirationInfo.new } + + describe 'test an instance of PasswordExpirationInfo' do + it 'should create an instance of PasswordExpirationInfo' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::PasswordExpirationInfo) + end + end + + describe 'test attribute "days_before_expire"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "days_before_notification"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "days_until_expire"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enable"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/reset_access_key_spec.rb b/spec/models/reset_access_key_spec.rb new file mode 100644 index 00000000..021e94bb --- /dev/null +++ b/spec/models/reset_access_key_spec.rb @@ -0,0 +1,54 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::ResetAccessKey +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::ResetAccessKey do + let(:instance) { Akeyless::ResetAccessKey.new } + + describe 'test an instance of ResetAccessKey' do + it 'should create an instance of ResetAccessKey' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::ResetAccessKey) + end + end + + describe 'test attribute "json"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "name"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "uid_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/reset_auth_method_access_key_output_spec.rb b/spec/models/reset_auth_method_access_key_output_spec.rb new file mode 100644 index 00000000..22f38ffa --- /dev/null +++ b/spec/models/reset_auth_method_access_key_output_spec.rb @@ -0,0 +1,36 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::ResetAuthMethodAccessKeyOutput +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::ResetAuthMethodAccessKeyOutput do + let(:instance) { Akeyless::ResetAuthMethodAccessKeyOutput.new } + + describe 'test an instance of ResetAuthMethodAccessKeyOutput' do + it 'should create an instance of ResetAuthMethodAccessKeyOutput' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::ResetAuthMethodAccessKeyOutput) + end + end + + describe 'test attribute "access_key"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/ssh_bastion_conf_spec.rb b/spec/models/ssh_bastion_conf_spec.rb new file mode 100644 index 00000000..c1d6dcd3 --- /dev/null +++ b/spec/models/ssh_bastion_conf_spec.rb @@ -0,0 +1,54 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::SshBastionConf +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::SshBastionConf do + let(:instance) { Akeyless::SshBastionConf.new } + + describe 'test an instance of SshBastionConf' do + it 'should create an instance of SshBastionConf' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::SshBastionConf) + end + end + + describe 'test attribute "hide_session_recording"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "kexalgs"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "log_forwarding"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "session_termination"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/ssh_bastion_session_termination_spec.rb b/spec/models/ssh_bastion_session_termination_spec.rb new file mode 100644 index 00000000..693a67c1 --- /dev/null +++ b/spec/models/ssh_bastion_session_termination_spec.rb @@ -0,0 +1,60 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::SshBastionSessionTermination +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::SshBastionSessionTermination do + let(:instance) { Akeyless::SshBastionSessionTermination.new } + + describe 'test an instance of SshBastionSessionTermination' do + it 'should create an instance of SshBastionSessionTermination' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::SshBastionSessionTermination) + end + end + + describe 'test attribute "api_password"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "api_token"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "api_url"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "api_username"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "enabled"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/web_bastion_conf_spec.rb b/spec/models/web_bastion_conf_spec.rb new file mode 100644 index 00000000..befc39ae --- /dev/null +++ b/spec/models/web_bastion_conf_spec.rb @@ -0,0 +1,42 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::WebBastionConf +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::WebBastionConf do + let(:instance) { Akeyless::WebBastionConf.new } + + describe 'test an instance of WebBastionConf' do + it 'should create an instance of WebBastionConf' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::WebBastionConf) + end + end + + describe 'test attribute "guacamole"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "rdp_record"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/web_bastion_guacamole_spec.rb b/spec/models/web_bastion_guacamole_spec.rb new file mode 100644 index 00000000..025a6b88 --- /dev/null +++ b/spec/models/web_bastion_guacamole_spec.rb @@ -0,0 +1,36 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::WebBastionGuacamole +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::WebBastionGuacamole do + let(:instance) { Akeyless::WebBastionGuacamole.new } + + describe 'test an instance of WebBastionGuacamole' do + it 'should create an instance of WebBastionGuacamole' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::WebBastionGuacamole) + end + end + + describe 'test attribute "keyboard_layout"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end diff --git a/spec/models/web_bastion_rdp_record_spec.rb b/spec/models/web_bastion_rdp_record_spec.rb new file mode 100644 index 00000000..c6bbe12f --- /dev/null +++ b/spec/models/web_bastion_rdp_record_spec.rb @@ -0,0 +1,48 @@ +=begin +#Akeyless API + +#The purpose of this application is to provide access to Akeyless API. + +The version of the OpenAPI document: 2.0 +Contact: support@akeyless.io +Generated by: https://openapi-generator.tech +Generator version: 7.9.0-SNAPSHOT + +=end + +require 'spec_helper' +require 'json' +require 'date' + +# Unit tests for Akeyless::WebBastionRdpRecord +# Automatically generated by openapi-generator (https://openapi-generator.tech) +# Please update as you see appropriate +describe Akeyless::WebBastionRdpRecord do + let(:instance) { Akeyless::WebBastionRdpRecord.new } + + describe 'test an instance of WebBastionRdpRecord' do + it 'should create an instance of WebBastionRdpRecord' do + # uncomment below to test the instance creation + #expect(instance).to be_instance_of(Akeyless::WebBastionRdpRecord) + end + end + + describe 'test attribute "aws"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "azure"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + + describe 'test attribute "storage_type"' do + it 'should work' do + # assertion here. ref: https://rspec.info/features/3-12/rspec-expectations/built-in-matchers/ + end + end + +end