diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index 79643df1..e568f9e4 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -45,6 +45,7 @@ docs/CertificateExpirationEvent.md docs/CertificateInfo.md docs/CertificateIssueInfo.md docs/CertificateTemplateInfo.md +docs/CertificateVersionInfo.md docs/CfInfo.md docs/ChefTargetDetails.md docs/ClassicKeyDetailsInfo.md @@ -536,11 +537,15 @@ docs/PathRule.md docs/PingTargetDetails.md docs/Producer.md docs/ProducersConfigPart.md +docs/ProvisionCertificate.md +docs/ProvisionCertificateOutput.md docs/RabbitMQTargetDetails.md docs/RawCreds.md docs/RefreshKey.md docs/RefreshKeyOutput.md docs/RegexpTokenizerInfo.md +docs/RenewCertificate.md +docs/RenewCertificateOutput.md docs/RequestAccess.md docs/RequestAccessOutput.md docs/RequiredActivity.md @@ -811,6 +816,7 @@ src/main/java/io/akeyless/client/model/CertificateExpirationEvent.java src/main/java/io/akeyless/client/model/CertificateInfo.java src/main/java/io/akeyless/client/model/CertificateIssueInfo.java src/main/java/io/akeyless/client/model/CertificateTemplateInfo.java +src/main/java/io/akeyless/client/model/CertificateVersionInfo.java src/main/java/io/akeyless/client/model/CfInfo.java src/main/java/io/akeyless/client/model/ChefTargetDetails.java src/main/java/io/akeyless/client/model/ClassicKeyDetailsInfo.java @@ -1302,11 +1308,15 @@ src/main/java/io/akeyless/client/model/PathRule.java src/main/java/io/akeyless/client/model/PingTargetDetails.java src/main/java/io/akeyless/client/model/Producer.java src/main/java/io/akeyless/client/model/ProducersConfigPart.java +src/main/java/io/akeyless/client/model/ProvisionCertificate.java +src/main/java/io/akeyless/client/model/ProvisionCertificateOutput.java src/main/java/io/akeyless/client/model/RabbitMQTargetDetails.java src/main/java/io/akeyless/client/model/RawCreds.java src/main/java/io/akeyless/client/model/RefreshKey.java src/main/java/io/akeyless/client/model/RefreshKeyOutput.java src/main/java/io/akeyless/client/model/RegexpTokenizerInfo.java +src/main/java/io/akeyless/client/model/RenewCertificate.java +src/main/java/io/akeyless/client/model/RenewCertificateOutput.java src/main/java/io/akeyless/client/model/RequestAccess.java src/main/java/io/akeyless/client/model/RequestAccessOutput.java src/main/java/io/akeyless/client/model/RequiredActivity.java @@ -1508,15 +1518,8 @@ src/main/java/io/akeyless/client/model/WindowsService.java src/main/java/io/akeyless/client/model/WindowsServiceAttributes.java src/main/java/io/akeyless/client/model/WindowsTargetDetails.java src/main/java/io/akeyless/client/model/ZeroSSLTargetDetails.java -src/test/java/io/akeyless/client/model/CreateUSCOutputTest.java -src/test/java/io/akeyless/client/model/CreateUSCTest.java -src/test/java/io/akeyless/client/model/UscCreateSecretOutputTest.java -src/test/java/io/akeyless/client/model/UscCreateTest.java -src/test/java/io/akeyless/client/model/UscDeleteSecretOutputTest.java -src/test/java/io/akeyless/client/model/UscDeleteTest.java -src/test/java/io/akeyless/client/model/UscGetSecretOutputTest.java -src/test/java/io/akeyless/client/model/UscGetTest.java -src/test/java/io/akeyless/client/model/UscListSecretsOutputTest.java -src/test/java/io/akeyless/client/model/UscListTest.java -src/test/java/io/akeyless/client/model/UscUpdateSecretOutputTest.java -src/test/java/io/akeyless/client/model/UscUpdateTest.java +src/test/java/io/akeyless/client/model/CertificateVersionInfoTest.java +src/test/java/io/akeyless/client/model/ProvisionCertificateOutputTest.java +src/test/java/io/akeyless/client/model/ProvisionCertificateTest.java +src/test/java/io/akeyless/client/model/RenewCertificateOutputTest.java +src/test/java/io/akeyless/client/model/RenewCertificateTest.java diff --git a/README.md b/README.md index cb9a0ed4..4a39a1e9 100644 --- a/README.md +++ b/README.md @@ -320,8 +320,10 @@ Class | Method | HTTP request | Description *V2Api* | [**listSharedItems**](docs/V2Api.md#listSharedItems) | **POST** /list-shared-items | *V2Api* | [**listTargets**](docs/V2Api.md#listTargets) | **POST** /list-targets | *V2Api* | [**moveObjects**](docs/V2Api.md#moveObjects) | **POST** /move-objects | +*V2Api* | [**provisionCertificate**](docs/V2Api.md#provisionCertificate) | **POST** /provision-certificate | *V2Api* | [**rawCreds**](docs/V2Api.md#rawCreds) | **POST** /raw-creds | *V2Api* | [**refreshKey**](docs/V2Api.md#refreshKey) | **POST** /refresh-key | +*V2Api* | [**renewCertificate**](docs/V2Api.md#renewCertificate) | **POST** /renew-certificate | *V2Api* | [**requestAccess**](docs/V2Api.md#requestAccess) | **POST** /request-access | *V2Api* | [**reverseRBAC**](docs/V2Api.md#reverseRBAC) | **POST** /reverse-rbac | *V2Api* | [**revokeCreds**](docs/V2Api.md#revokeCreds) | **POST** /revoke-creds | @@ -389,7 +391,7 @@ Class | Method | HTTP request | Description *V2Api* | [**updateRabbitMQTargetDetails**](docs/V2Api.md#updateRabbitMQTargetDetails) | **POST** /update-rabbitmq-target-details | *V2Api* | [**updateRole**](docs/V2Api.md#updateRole) | **POST** /update-role | *V2Api* | [**updateRotatedSecret**](docs/V2Api.md#updateRotatedSecret) | **POST** /update-rotated-secret | -*V2Api* | [**updateRotationSettings**](docs/V2Api.md#updateRotationSettings) | **POST** /update-rotation-settingsrotate-key | +*V2Api* | [**updateRotationSettings**](docs/V2Api.md#updateRotationSettings) | **POST** /update-rotation-settings | *V2Api* | [**updateSSHCertIssuer**](docs/V2Api.md#updateSSHCertIssuer) | **POST** /update-ssh-cert-issuer | *V2Api* | [**updateSSHTarget**](docs/V2Api.md#updateSSHTarget) | **POST** /update-ssh-target | *V2Api* | [**updateSSHTargetDetails**](docs/V2Api.md#updateSSHTargetDetails) | **POST** /update-ssh-target-details | @@ -460,6 +462,7 @@ Class | Method | HTTP request | Description - [CertificateInfo](docs/CertificateInfo.md) - [CertificateIssueInfo](docs/CertificateIssueInfo.md) - [CertificateTemplateInfo](docs/CertificateTemplateInfo.md) + - [CertificateVersionInfo](docs/CertificateVersionInfo.md) - [CfInfo](docs/CfInfo.md) - [ChefTargetDetails](docs/ChefTargetDetails.md) - [ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md) @@ -951,11 +954,15 @@ Class | Method | HTTP request | Description - [PingTargetDetails](docs/PingTargetDetails.md) - [Producer](docs/Producer.md) - [ProducersConfigPart](docs/ProducersConfigPart.md) + - [ProvisionCertificate](docs/ProvisionCertificate.md) + - [ProvisionCertificateOutput](docs/ProvisionCertificateOutput.md) - [RabbitMQTargetDetails](docs/RabbitMQTargetDetails.md) - [RawCreds](docs/RawCreds.md) - [RefreshKey](docs/RefreshKey.md) - [RefreshKeyOutput](docs/RefreshKeyOutput.md) - [RegexpTokenizerInfo](docs/RegexpTokenizerInfo.md) + - [RenewCertificate](docs/RenewCertificate.md) + - [RenewCertificateOutput](docs/RenewCertificateOutput.md) - [RequestAccess](docs/RequestAccess.md) - [RequestAccessOutput](docs/RequestAccessOutput.md) - [RequiredActivity](docs/RequiredActivity.md) diff --git a/api/openapi.yaml b/api/openapi.yaml index 41787e5c..866f4cdd 100644 --- a/api/openapi.yaml +++ b/api/openapi.yaml @@ -6258,6 +6258,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /provision-certificate: + post: + operationId: provisionCertificate + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/provisionCertificate' + required: true + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/ProvisionCertificateOutput' + description: provisionCertificateResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /raw-creds: post: operationId: rawCreds @@ -6316,6 +6345,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /renew-certificate: + post: + operationId: RenewCertificate + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/RenewCertificate' + required: true + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/RenewCertificateOutput' + description: renewCertificateResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /request-access: post: operationId: requestAccess @@ -6431,7 +6489,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/updateRotationSettings' + $ref: '#/components/schemas/rotateKey' required: true responses: "200": @@ -6696,7 +6754,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/signPKCS1Output' + $ref: '#/components/schemas/SignPKCS1Output' description: signPKCS1Response wraps response body. default: content: @@ -8219,9 +8277,15 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json - /update-rotation-settingsrotate-key: + /update-rotation-settings: post: operationId: updateRotationSettings + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/updateRotationSettings' + required: true responses: "200": content: @@ -8239,6 +8303,8 @@ paths: field. tags: - v2 + x-codegen-request-body-name: body + x-contentType: application/json x-accepts: application/json /update-salesforce-target: post: @@ -10344,6 +10410,12 @@ components: schema: $ref: '#/components/schemas/moveObjectsOutput' description: moveObjectsResponse wraps response body. + provisionCertificateResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/ProvisionCertificateOutput' + description: provisionCertificateResponse wraps response body. rawCredsResponse: content: application/json: @@ -10356,6 +10428,12 @@ components: schema: $ref: '#/components/schemas/refreshKeyOutput' description: refreshKeyResponse wraps response body. + renewCertificateResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/RenewCertificateOutput' + description: renewCertificateResponse wraps response body. requestAccessResponse: content: application/json: @@ -10444,7 +10522,7 @@ components: content: application/json: schema: - $ref: '#/components/schemas/signPKCS1Output' + $ref: '#/components/schemas/SignPKCS1Output' description: signPKCS1Response wraps response body. signPKICertWithClassicKeyResponse: content: @@ -11550,6 +11628,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups - general: prefix: prefix name: name @@ -11569,6 +11650,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups azure_kv_migrations: - general: prefix: prefix @@ -12226,7 +12310,6 @@ components: x-go-package: crypto/x509/pkix AuthMethod: example: - account_id: account_id auth_method_roles_assoc: - is_sub_claims_case_sensitive: true role_name: role_name @@ -12314,10 +12397,14 @@ components: key: - auth_method_sub_claims - auth_method_sub_claims + access_date: 2000-01-23T04:56:07.000+00:00 + description: description + creation_date: 2000-01-23T04:56:07.000+00:00 + auth_method_access_id: auth_method_access_id + account_id: account_id client_permissions: - client_permissions - client_permissions - access_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 is_approved: true associated_gw_ids: @@ -12541,10 +12628,8 @@ components: enc_email_with_shared_key: enc_email_with_shared_key alg: alg email: email - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display auth_method_name: auth_method_name - auth_method_access_id: auth_method_access_id properties: access_date: format: date-time @@ -12584,6 +12669,9 @@ components: format: date-time type: string x-go-name: CreationDate + description: + type: string + x-go-name: Description is_approved: type: boolean x-go-name: IsApproved @@ -13435,6 +13523,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -13644,6 +13734,12 @@ components: certificate_format: type: string x-go-name: CertificateFormat + certificate_has_private_key: + type: boolean + x-go-name: CertificateHasPrivateKey + certificate_issuer_gw_cluster_url: + type: string + x-go-name: CertificateIssuerGwClusterUrl certificate_issuer_item_id: format: int64 type: integer @@ -14001,6 +14097,25 @@ components: x-go-name: TTL type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + CertificateVersionInfo: + example: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status + properties: + not_after: + format: date-time + type: string + x-go-name: NotAfter + not_before: + format: date-time + type: string + x-go-name: NotBefore + status: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types CfInfo: example: cf_name: cf_name @@ -14222,6 +14337,11 @@ components: supported by AKEYLESS. type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + ClientPermissions: + items: + type: string + type: array + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types ClusterApiType: description: ClusterApiType defines types of API access to cluster type: string @@ -14443,7 +14563,7 @@ components: type: string x-go-name: SSHLocation ssh-extra-args: - description: The Use to add offical SSH arguments (except -i) + description: Additional SSH arguments (except -i) type: string x-go-name: SSHExtraArgs ssh-legacy-signing-alg: @@ -15286,6 +15406,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -16471,7 +16594,7 @@ components: items: type: string type: array - x-go-name: ClientPermissions + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types title: DescribePermissionsOutput defines output of DescribePermissionsOutput operation. type: object @@ -17286,6 +17409,7 @@ components: - allowed_access_ids display_name: display_name cluster_url: cluster_url + serverless_type: serverless_type default_protection_key_id: 0 id: 6 customer_fragments: @@ -17312,6 +17436,7 @@ components: - allowed_access_ids display_name: display_name cluster_url: cluster_url + serverless_type: serverless_type default_protection_key_id: 0 id: 6 customer_fragments: @@ -17954,6 +18079,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -17964,6 +18093,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id modification_date: 2000-01-23T04:56:07.000+00:00 attributes: @@ -18189,6 +18322,7 @@ components: - allowed_access_ids display_name: display_name cluster_url: cluster_url + serverless_type: serverless_type default_protection_key_id: 0 id: 6 customer_fragments: @@ -18248,6 +18382,9 @@ components: format: int64 type: integer x-go-name: Id + serverless_type: + type: string + x-go-name: ServerlessType status: type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types @@ -18387,6 +18524,7 @@ components: passwords_in_file: 6 successfully_parsed: 1 imported: 0 + updated: 5 properties: imported: format: int32 @@ -18400,6 +18538,10 @@ components: format: int64 type: integer x-go-name: SuccessfullyParsed + updated: + format: int32 + type: integer + x-go-name: Updated type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands ImporterInfo: @@ -18437,6 +18579,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -18447,6 +18593,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id shared_by: unique_id: unique_id @@ -18456,30 +18606,38 @@ components: is_enabled: true rotation_interval: 6 target_versions: - - item_version_state: item_version_state + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 + version: 5 + customer_fragment_id: customer_fragment_id + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 version: 5 customer_fragment_id: customer_fragment_id - - item_version_state: item_version_state + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 - customer_fragment_id: customer_fragment_id + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status item_metadata: item_metadata modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name @@ -18590,6 +18748,7 @@ components: item_general_info: static_secret_info: website: website + notify_on_change_event: true websites: - websites - websites @@ -18675,6 +18834,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -18713,6 +18875,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -19140,7 +19304,7 @@ components: items: type: string type: array - x-go-name: ClientPermissions + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types creation_date: format: date-time type: string @@ -19271,6 +19435,7 @@ components: example: static_secret_info: website: website + notify_on_change_event: true websites: - websites - websites @@ -19356,6 +19521,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -19394,6 +19562,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -19839,6 +20009,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id properties: access_date: @@ -19848,6 +20022,8 @@ components: access_date_display: type: string x-go-name: AccessDateDisplay + certificate_version_info: + $ref: '#/components/schemas/CertificateVersionInfo' creation_date: format: date-time type: string @@ -20840,8 +21016,7 @@ components: example: next_page: next_page auth_methods: - - account_id: account_id - auth_method_roles_assoc: + - auth_method_roles_assoc: - is_sub_claims_case_sensitive: true role_name: role_name assoc_id: assoc_id @@ -20928,10 +21103,14 @@ components: key: - auth_method_sub_claims - auth_method_sub_claims + access_date: 2000-01-23T04:56:07.000+00:00 + description: description + creation_date: 2000-01-23T04:56:07.000+00:00 + auth_method_access_id: auth_method_access_id + account_id: account_id client_permissions: - client_permissions - client_permissions - access_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 is_approved: true associated_gw_ids: @@ -21155,12 +21334,9 @@ components: enc_email_with_shared_key: enc_email_with_shared_key alg: alg email: email - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display auth_method_name: auth_method_name - auth_method_access_id: auth_method_access_id - - account_id: account_id - auth_method_roles_assoc: + - auth_method_roles_assoc: - is_sub_claims_case_sensitive: true role_name: role_name assoc_id: assoc_id @@ -21247,10 +21423,14 @@ components: key: - auth_method_sub_claims - auth_method_sub_claims + access_date: 2000-01-23T04:56:07.000+00:00 + description: description + creation_date: 2000-01-23T04:56:07.000+00:00 + auth_method_access_id: auth_method_access_id + account_id: account_id client_permissions: - client_permissions - client_permissions - access_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 is_approved: true associated_gw_ids: @@ -21474,10 +21654,8 @@ components: enc_email_with_shared_key: enc_email_with_shared_key alg: alg email: email - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display auth_method_name: auth_method_name - auth_method_access_id: auth_method_access_id properties: auth_methods: items: @@ -21571,6 +21749,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -21581,6 +21763,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id shared_by: unique_id: unique_id @@ -21590,30 +21776,38 @@ components: is_enabled: true rotation_interval: 6 target_versions: - - item_version_state: item_version_state + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 + version: 5 + customer_fragment_id: customer_fragment_id + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 version: 5 customer_fragment_id: customer_fragment_id - - item_version_state: item_version_state + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 - customer_fragment_id: customer_fragment_id + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status item_metadata: item_metadata modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name @@ -21724,6 +21918,7 @@ components: item_general_info: static_secret_info: website: website + notify_on_change_event: true websites: - websites - websites @@ -21809,6 +22004,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -21847,6 +22045,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -22265,6 +22465,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -22275,6 +22479,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id shared_by: unique_id: unique_id @@ -22284,30 +22492,38 @@ components: is_enabled: true rotation_interval: 6 target_versions: - - item_version_state: item_version_state + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 + version: 5 + customer_fragment_id: customer_fragment_id + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 version: 5 customer_fragment_id: customer_fragment_id - - item_version_state: item_version_state + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 - customer_fragment_id: customer_fragment_id + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status item_metadata: item_metadata modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name @@ -22418,6 +22634,7 @@ components: item_general_info: static_secret_info: website: website + notify_on_change_event: true websites: - websites - websites @@ -22503,6 +22720,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -22541,6 +22761,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -22981,6 +23203,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -22991,6 +23217,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id shared_by: unique_id: unique_id @@ -23000,30 +23230,38 @@ components: is_enabled: true rotation_interval: 6 target_versions: - - item_version_state: item_version_state + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 + version: 5 + customer_fragment_id: customer_fragment_id + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 version: 5 customer_fragment_id: customer_fragment_id - - item_version_state: item_version_state + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 - customer_fragment_id: customer_fragment_id + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status item_metadata: item_metadata modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name @@ -23134,6 +23372,7 @@ components: item_general_info: static_secret_info: website: website + notify_on_change_event: true websites: - websites - websites @@ -23219,6 +23458,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -23257,6 +23499,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -23675,6 +23919,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -23685,6 +23933,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id shared_by: unique_id: unique_id @@ -23694,30 +23946,38 @@ components: is_enabled: true rotation_interval: 6 target_versions: - - item_version_state: item_version_state + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 + version: 5 + customer_fragment_id: customer_fragment_id + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status + - target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 version: 5 customer_fragment_id: customer_fragment_id - - item_version_state: item_version_state + item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 - customer_fragment_id: customer_fragment_id + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status item_metadata: item_metadata modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name @@ -23828,6 +24088,7 @@ components: item_general_info: static_secret_info: website: website + notify_on_change_event: true websites: - websites - websites @@ -23913,6 +24174,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -23951,6 +24215,8 @@ components: certificate_issuer_item_id: 1 certificate_pem: certificate_pem certificate_format: certificate_format + certificate_has_private_key: true + certificate_issuer_gw_cluster_url: certificate_issuer_gw_cluster_url certificate_chain: - email_addresses: - email_addresses @@ -24537,6 +24803,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -24547,6 +24817,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id modification_date: 2000-01-23T04:56:07.000+00:00 attributes: @@ -24594,6 +24868,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -24604,6 +24882,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id modification_date: 2000-01-23T04:56:07.000+00:00 attributes: @@ -25019,6 +25301,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups - general: prefix: prefix name: name @@ -25038,6 +25323,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups azure_kv_migrations: - general: prefix: prefix @@ -25574,6 +25862,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -25584,6 +25876,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id protection_key: protection_key client_id: client_id @@ -26407,6 +26703,30 @@ components: x-go-name: Producers type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/akeyless-api/gator + ProvisionCertificateOutput: + example: + SuccessMessage: SuccessMessage + host_names: + - host_names + - host_names + FailMessage: FailMessage + provisioned_at: 2000-01-23T04:56:07.000+00:00 + properties: + FailMessage: + type: string + SuccessMessage: + type: string + host_names: + items: + type: string + type: array + x-go-name: HostNames + provisioned_at: + format: date-time + type: string + x-go-name: ProvisionedAt + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types RabbitMQTargetDetails: example: rabbitmq_server_uri: rabbitmq_server_uri @@ -26454,6 +26774,74 @@ components: x-go-name: Pattern type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + RenewCertificate: + example: + item-id: 0 + name: name + json: false + generate-key: true + uid-token: uid-token + token: token + properties: + generate-key: + description: Generate a new key as part of the certificate renewal + type: boolean + x-go-name: GenerateKey + item-id: + description: Certificate item id + format: int64 + type: integer + x-go-name: ItemId + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + name: + description: Certificate name + type: string + x-go-name: CertName + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + title: RenewCertificate is a command that renews a PKI certificate. + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + RenewCertificateOutput: + example: + parent_cert: parent_cert + item_id: item_id + reading_token: reading_token + cert: cert + private_key: private_key + cert_display_id: cert_display_id + properties: + cert: + type: string + x-go-name: Cert + cert_display_id: + type: string + x-go-name: CertDisplayID + item_id: + type: string + x-go-name: ItemID + parent_cert: + type: string + x-go-name: ParentCert + private_key: + type: string + x-go-name: PrivateKey + reading_token: + type: string + x-go-name: IssuanceToken + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands RequiredActivity: example: migrations_required_activity: @@ -27370,6 +27758,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -27487,6 +27878,11 @@ components: $ref: '#/components/schemas/TargetNameWithHosts' type: array x-go-name: TargetNameWithHosts + targets: + items: + type: string + type: array + x-go-name: Targets url: type: string x-go-name: URL @@ -27522,6 +27918,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups properties: general: $ref: '#/components/schemas/MigrationGeneral' @@ -27540,6 +27939,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups properties: auto_rotate: type: boolean @@ -27562,6 +27964,11 @@ components: server_targets_path_template: type: string x-go-name: ServerTargetsPathTemplate + user_groups: + items: + type: string + type: array + x-go-name: UserGroups users_ignore_list: additionalProperties: type: boolean @@ -27594,6 +28001,15 @@ components: x-go-name: Result type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + SignPKCS1Output: + example: + result: result + properties: + result: + type: string + x-go-name: Result + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands SignRsaSsaPssOutput: example: result: result @@ -27677,11 +28093,15 @@ components: StaticSecretDetailsInfo: example: website: website + notify_on_change_event: true websites: - websites - websites username: username properties: + notify_on_change_event: + type: boolean + x-go-name: NotifyOnChangeEvent username: type: string x-go-name: Username @@ -27845,6 +28265,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -27855,6 +28279,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id modification_date: 2000-01-23T04:56:07.000+00:00 attributes: @@ -27986,18 +28414,22 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types TargetItemVersion: example: + target_name: target_name + access_date: 2000-01-23T04:56:07.000+00:00 + creation_date: 2000-01-23T04:56:07.000+00:00 + version: 5 + customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true latest_version: true - target_name: target_name - access_date: 2000-01-23T04:56:07.000+00:00 deletion_date: 2000-01-23T04:56:07.000+00:00 modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name - creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 - customer_fragment_id: customer_fragment_id + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status properties: access_date: format: date-time @@ -28006,6 +28438,8 @@ components: access_date_display: type: string x-go-name: AccessDateDisplay + certificate_version_info: + $ref: '#/components/schemas/CertificateVersionInfo' creation_date: format: date-time type: string @@ -28536,6 +28970,9 @@ components: x-go-name: Name type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + UpdateModeType: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands UpdateOidcAppOutput: type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands @@ -29178,6 +29615,16 @@ components: assocTargetItem is a command that creates an association between target and item. properties: + certificate-path: + description: A path on the target to store the certificate pem file (relevant + only for certificate provisioning) + type: string + x-go-name: CertificatePath + chain-path: + description: A path on the target to store the full chain pem file (relevant + only for certificate provisioning) + type: string + x-go-name: ChainPath disable-previous-key-version: default: false description: Automatically disable previous key version (required for azure @@ -29218,6 +29665,11 @@ components: description: The item to associate type: string x-go-name: ItemName + private-key-path: + description: A path on the target to store the private key (relevant only + for certificate provisioning) + type: string + x-go-name: PrivateKeyPath project-id: description: Project id of the GCP KMS (required for gcp targets) type: string @@ -29233,6 +29685,12 @@ components: type: string type: array x-go-name: Regions + sra-association: + default: false + description: Is the target to associate is for sra, relevant only for linked + target association for ldap rotated secret + type: boolean + x-go-name: IsSraAssociation target-name: description: The target to associate type: string @@ -29597,6 +30055,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -29699,6 +30161,10 @@ components: type: string type: array x-go-name: BoundUserName + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -29768,7 +30234,9 @@ components: x-go-name: AccessExpires audience: default: https://management.azure.com/ - description: The audience in the JWT + description: |- + Deprecated + (Deprecated) The audience in the JWT type: string x-go-name: Audience bound-group-id: @@ -29837,6 +30305,10 @@ components: description: The Azure tenant id that the access is restricted to type: string x-go-name: BoundTenantID + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -29971,6 +30443,10 @@ components: description: The certificate data in base64, if no file was provided type: string x-go-name: CertificateData + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30056,6 +30532,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description email: description: An email address to be invited to have access type: string @@ -30175,6 +30655,10 @@ components: type: string type: array x-go-name: BoundZones + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30295,6 +30779,10 @@ components: type: string type: array x-go-name: BoundUserName + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30387,6 +30875,10 @@ components: type: string type: array x-go-name: BoundServiceAccountNames + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30470,6 +30962,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30577,6 +31073,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30711,6 +31211,10 @@ components: description: Client Secret type: string x-go-name: ClientSecret + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30839,6 +31343,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -30943,6 +31451,10 @@ components: description: Deny from the token to rotate type: boolean x-go-name: BoundDenyRotate + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -31670,9 +32182,11 @@ components: x-go-name: EventSourceType event-types: description: List of event types to notify about [request-access, certificate-pending-expiration, - certificate-expired, auth-method-pending-expiration, auth-method-expired, - rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, - multi-auth-failure, uid-rotation-failure] + certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, + auth-method-pending-expiration, auth-method-expired, rotated-secret-success, + rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, + apply-justification, email-auth-method-approved, usage, rotation-usage, + gateway-inactive, static-secret-updated] items: type: string type: array @@ -32373,6 +32887,11 @@ components: description: Authentication token (see `/auth` and `/configure`) type: string x-go-name: Profile + type: + description: Specifies the hosts type, relevant only when working without + parent target + type: string + x-go-name: HostType uid-token: description: The universal identity token, Required only for universal_identity authentication @@ -32717,6 +33236,17 @@ components: description: Description of the object type: string x-go-name: Description + event-center-access: + description: |- + Allow this role to view Event Center. Currently only 'none', 'own' and 'all' + values are supported + type: string + x-go-name: EventCenterAccess + event-forwarders-access: + description: Allow this role to manage Event Forwarders. Currently only + 'none' and 'all' values are supported. + type: string + x-go-name: EventForwardersAccess gw-analytics-access: description: |- Allow this role to view gw analytics. Currently only 'none', 'own', 'all' @@ -32764,6 +33294,9 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands createRotatedSecret: properties: + ProviderType: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types api-id: description: API ID to rotate (relevant only for rotator-type=api-key) type: string @@ -32817,6 +33350,12 @@ components: description: The key id of the gcp service account to rotate type: string x-go-name: GcpServiceAccountKeyId + host-provider: + default: explicit + description: Host provider type [explicit/target], Relevant only for Secure + Remote Access of ssh cert issuer and ldap rotated secret + type: string + x-go-name: HostProviderType json: default: false description: Set output format to JSON @@ -32853,7 +33392,7 @@ components: type: string x-go-name: RotatedUser rotation-hour: - description: The Hour of the rotation in UTC + description: The Hour of the rotation in UTC. Default rotation-hour is 14:00 format: int32 type: integer x-go-name: RotationHour @@ -32960,6 +33499,14 @@ components: type: string type: array x-go-name: Tags + target: + description: A list of linked targets to be associated, Relevant only for + Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify + multiple targets use argument multiple times + items: + type: string + type: array + x-go-name: TargetNames target-name: description: Target name type: string @@ -32990,7 +33537,7 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands createSSHCertIssuer: properties: - SshCertIssuerHostProvider: + ProviderType: type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types allowed-users: @@ -33013,7 +33560,8 @@ components: x-go-name: Extensions host-provider: default: explicit - description: Host provider type [explicit/target] + description: Host provider type [explicit/target], Relevant only for Secure + Remote Access of ssh cert issuer and ldap rotated secret type: string x-go-name: HostProviderType json: @@ -33072,9 +33620,9 @@ components: type: array x-go-name: Tags target: - description: A list of existing targets to be associated, Relevant only - for Secure Remote Access, To specify multiple targets use argument multiple - times + description: A list of linked targets to be associated, Relevant only for + Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify + multiple targets use argument multiple times items: type: string type: array @@ -33291,6 +33839,11 @@ components: description: for personal password manager type: string x-go-name: ItemAccessibilityString + change-event: + description: Trigger an event when a secret value changed [true/false] (Relevant + only for Static Secret) + type: string + x-go-name: NotifyOnChangeEvent custom-field: additionalProperties: type: string @@ -35821,6 +36374,12 @@ components: Inventory migration) type: string x-go-name: SiTargetName + si-user-groups: + description: Comma-separated list of groups to migrate users from. If empty, + all users from all groups will be migrated (Relevant only for Server Inventory + migration) + type: string + x-go-name: SiUserGroups si-users-ignore: description: Comma-separated list of Local Users which should not be migrated (Relevant only for Server Inventory migration) @@ -36075,6 +36634,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -36508,6 +37070,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -36927,6 +37492,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -37125,6 +37693,16 @@ components: description: Dynamic producer encryption key type: string x-go-name: ProducerEncryptionKey + ssl: + default: false + description: Enable/Disable SSL [true/false] + type: boolean + x-go-name: SSLConnection + ssl-certificate: + description: SSL CA certificate in base64 encoding generated from a trusted + Certificate Authority (CA) + type: string + x-go-name: SSLConnectionCertificate tags: description: Add tags attached to this object items: @@ -37301,6 +37879,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -37732,6 +38313,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -38196,6 +38780,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -38564,6 +39151,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -38966,6 +39556,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -39348,6 +39941,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -39720,6 +40316,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -40113,6 +40712,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -40519,6 +41121,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -40908,6 +41513,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -41314,6 +41922,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -41737,6 +42348,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -42156,6 +42770,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -42591,6 +43208,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -43003,6 +43623,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -43454,6 +44077,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -43866,6 +44492,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -44274,6 +44903,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -44690,6 +45322,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -45076,6 +45711,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -45471,6 +46109,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -45852,6 +46493,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -46746,6 +47390,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups - general: prefix: prefix name: name @@ -46765,6 +47412,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups azure_kv_migrations: - general: prefix: prefix @@ -47091,6 +47741,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups - general: prefix: prefix name: name @@ -47110,6 +47763,9 @@ components: migration_target_id: 9 users_rotated_secrets_path_template: users_rotated_secrets_path_template auto_rotate_interval_in_days: 5 + user_groups: + - user_groups + - user_groups azure_kv_migrations: - general: prefix: prefix @@ -47628,6 +48284,10 @@ components: description: API key to rotate (relevant only for rotator-type=api-key) type: string x-go-name: ApiKey + app-id: + description: ApplicationId (used in azure) + type: string + x-go-name: ApplicationId auto-rotate: description: Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] @@ -48264,6 +48924,12 @@ components: Inventory migration) type: string x-go-name: SiTargetName + si-user-groups: + description: Comma-separated list of groups to migrate users from. If empty, + all users from all groups will be migrated (Relevant only for Server Inventory + migration) + type: string + x-go-name: SiUserGroups si-users-ignore: description: Comma-separated list of Local Users which should not be migrated (Relevant only for Server Inventory migration) @@ -48517,6 +49183,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -48954,6 +49623,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -49377,6 +50049,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -49579,6 +50254,16 @@ components: description: Dynamic producer encryption key type: string x-go-name: ProducerEncryptionKey + ssl: + default: false + description: Enable/Disable SSL [true/false] + type: boolean + x-go-name: SSLConnection + ssl-certificate: + description: SSL CA certificate in base64 encoding generated from a trusted + Certificate Authority (CA) + type: string + x-go-name: SSLConnectionCertificate tags: description: Add tags attached to this object items: @@ -49755,6 +50440,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -50190,6 +50878,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -50662,6 +51353,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -51034,6 +51728,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -51440,6 +52137,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -51826,6 +52526,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -52202,6 +52905,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -52599,6 +53305,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -53009,6 +53718,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -53402,6 +54114,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -53812,6 +54527,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -54239,6 +54957,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -54662,6 +55383,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -55101,6 +55825,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -55517,6 +56244,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -55972,6 +56702,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -56388,6 +57121,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -56800,6 +57536,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -57220,6 +57959,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -57610,6 +58352,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -58009,6 +58754,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -58394,6 +59142,9 @@ components: hosts: - hosts - hosts + targets: + - targets + - targets ssh_private_key: true allow_port_forwarding: true is_web: true @@ -58668,7 +59419,7 @@ components: type: string x-go-name: KeyType name: - description: The classic key name + description: The key name type: string x-go-name: KeyName org: @@ -58909,6 +59660,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id - item_version_state: item_version_state with_customer_fragment: true @@ -58919,6 +59674,10 @@ components: creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display version: 2 + certificate_version_info: + not_after: 2000-01-23T04:56:07.000+00:00 + not_before: 2000-01-23T04:56:07.000+00:00 + status: status customer_fragment_id: customer_fragment_id protection_key: protection_key client_id: client_id @@ -59490,6 +60249,9 @@ components: authentication type: string x-go-name: UIDToken + update-mode: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands required: - import-path type: object @@ -60259,6 +61021,41 @@ components: moveObjectsOutput: type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + provisionCertificate: + description: provisionCertificate is a command that provisions a certificate + content to a target + properties: + display-id: + description: Certificate display ID + type: string + x-go-name: CertificateDisplayID + item-id: + description: Certificate item ID + format: int64 + type: integer + x-go-name: CertificateItemId + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + name: + description: Certificate name + type: string + x-go-name: CertificateName + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + required: + - name + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands rawCreds: properties: access-id: @@ -60618,7 +61415,7 @@ components: rule-type: default: item-rule description: item-rule, target-rule, role-rule, auth-method-rule, search-rule, - reports-rule, gw-reports-rule or sra-reports-rule + reports-rule, gw-reports-rule or sra-reports-rule, sra-rule type: string x-go-name: RuleType token: @@ -60718,6 +61515,12 @@ components: description: HashingMethod type: string x-go-name: HashingMethod + ignore-cache: + default: "false" + description: Retrieve the Secret value without checking the Gateway's cache + [true/false]. This flag is only relevant when using the RestAPI + type: string + x-go-name: IgnoreCache json: default: false description: Set output format to JSON @@ -60777,6 +61580,10 @@ components: description: The input message to sign in a base64 format type: string x-go-name: Message + prehashed: + description: Markes that the message is already hashed + type: boolean + x-go-name: Prehashed token: description: Authentication token (see `/auth` and `/configure`) type: string @@ -60786,6 +61593,11 @@ components: authentication type: string x-go-name: UIDToken + version: + description: The version of the key to use for signing + format: int32 + type: integer + x-go-name: Version required: - message type: object @@ -60912,6 +61724,15 @@ components: description: The display id of the key to use in the signing process type: string x-go-name: DisplayId + hash-function: + description: HashFunction defines the hash function (e.g. sha-256) + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + input-format: + description: 'Select default assumed format for the plaintext message. Currently + supported options: [base64]' + type: string + x-go-name: InputFormat item-id: description: The item id of the key to use in the signing process format: int64 @@ -60930,6 +61751,10 @@ components: description: The message to be signed type: string x-go-name: Message + prehashed: + description: Markes that the message is already hashed + type: boolean + x-go-name: Prehashed token: description: Authentication token (see `/auth` and `/configure`) type: string @@ -60939,24 +61764,15 @@ components: authentication type: string x-go-name: UIDToken + version: + description: The version of the key to use for signing + format: int32 + type: integer + x-go-name: Version required: - message type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands - signPKCS1Output: - example: - result: - - 0 - - 0 - properties: - result: - items: - format: uint8 - type: integer - type: array - x-go-name: Result - type: object - x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands signPKICertOutput: example: result: result @@ -61104,6 +61920,10 @@ components: description: The input message to sign in a base64 format type: string x-go-name: Message + prehashed: + description: Markes that the message is already hashed + type: boolean + x-go-name: Prehashed token: description: Authentication token (see `/auth` and `/configure`) type: string @@ -61113,6 +61933,11 @@ components: authentication type: string x-go-name: UIDToken + version: + description: The version of the key to use for signing + format: int32 + type: integer + x-go-name: Version required: - message type: object @@ -61863,6 +62688,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -61969,6 +62798,10 @@ components: type: string type: array x-go-name: BoundUserName + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62036,7 +62869,9 @@ components: x-go-name: AccessExpires audience: default: https://management.azure.com/ - description: The audience in the JWT + description: |- + Deprecated + (Deprecated) The audience in the JWT type: string x-go-name: Audience bound-group-id: @@ -62105,6 +62940,10 @@ components: description: The Azure tenant id that the access is restricted to type: string x-go-name: BoundTenantID + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62237,6 +63076,10 @@ components: description: The certificate data in base64, if no file was provided type: string x-go-name: CertificateData + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62372,6 +63215,10 @@ components: type: string type: array x-go-name: BoundZones + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62473,6 +63320,10 @@ components: type: string type: array x-go-name: BoundServiceAccountNames + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62555,6 +63406,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62661,6 +63516,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62793,6 +63652,10 @@ components: description: Client Secret type: string x-go-name: ClientSecret + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -62911,6 +63774,10 @@ components: type: string type: array x-go-name: CIDRWhitelist + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -63013,6 +63880,10 @@ components: description: Deny from the token to rotate type: boolean x-go-name: BoundDenyRotate + description: + description: Auth Method description + type: string + x-go-name: Description force-sub-claims: description: 'if true: enforce role-association must include sub claims' type: boolean @@ -63198,6 +64069,11 @@ components: description: Set output format to JSON type: boolean x-go-name: Json + keep-prev-version: + description: Whether to keep previous version [true/false]. If not set, + use default according to account settings + type: string + x-go-name: KeepPrevVersion key: description: |- The name of a key to use to encrypt the certificate's key (if empty, the @@ -64182,6 +65058,9 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands updateItem: properties: + ProviderType: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types accessibility: default: regular description: for personal password manager @@ -64198,6 +65077,11 @@ components: certificates. type: string x-go-name: CertFileData + change-event: + description: Trigger an event when a secret value changed [true/false] (Relevant + only for Static Secret) + type: string + x-go-name: NotifyOnChangeEvent delete_protection: description: Protection from accidental deletion of this item [true/false] type: string @@ -64207,6 +65091,12 @@ components: description: Description of the object type: string x-go-name: Description + host-provider: + default: explicit + description: Host provider type [explicit/target], Relevant only for Secure + Remote Access of ssh cert issuer and ldap rotated secret + type: string + x-go-name: HostProviderType json: default: false description: Set output format to JSON @@ -64566,6 +65456,11 @@ components: description: Authentication token (see `/auth` and `/configure`) type: string x-go-name: Profile + type: + description: Specifies the hosts type, relevant only when working without + parent target + type: string + x-go-name: HostType uid-token: description: The universal identity token, Required only for universal_identity authentication @@ -65027,6 +65922,17 @@ components: description: Description of the object type: string x-go-name: Description + event-center-access: + description: |- + Allow this role to view Event Center. Currently only 'none', 'own' and 'all' + values are supported + type: string + x-go-name: EventCenterAccess + event-forwarder-access: + description: Allow this role to manage Event Forwarders. Currently only + 'none' and 'all' values are supported. + type: string + x-go-name: EventForwardersAccess gw-analytics-access: description: |- Allow this role to view gw analytics. Currently only 'none', 'own', 'all' @@ -65345,7 +66251,7 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands updateSSHCertIssuer: properties: - SshCertIssuerHostProvider: + ProviderType: type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types add-tag: @@ -65374,7 +66280,8 @@ components: x-go-name: Extensions host-provider: default: explicit - description: Host provider type [explicit/target] + description: Host provider type [explicit/target], Relevant only for Secure + Remote Access of ssh cert issuer and ldap rotated secret type: string x-go-name: HostProviderType json: @@ -65767,6 +66674,11 @@ components: account default protectionKey key will be used) type: string x-go-name: ProtectionKey + last-version: + description: The last version number before the update + format: int32 + type: integer + x-go-name: LastVersion multiline: description: The provided value is a multiline value (separated by '\n') type: boolean @@ -66620,6 +67532,10 @@ components: description: The message to be verified in a base64 format type: string x-go-name: Message + prehashed: + description: Markes that the message is already hashed + type: boolean + x-go-name: Prehashed signature: description: The message's signature type: string @@ -66633,6 +67549,11 @@ components: authentication type: string x-go-name: UIDToken + version: + description: The version of the key to use for verification + format: int32 + type: integer + x-go-name: Version required: - message - signature @@ -66744,6 +67665,15 @@ components: description: The display id of the key to use in the verification process type: string x-go-name: DisplayId + hash-function: + description: HashFunction defines the hash function (e.g. sha-256) + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + input-format: + description: 'Select default assumed format for the plaintext message. Currently + supported options: [base64]' + type: string + x-go-name: InputFormat item-id: description: The item id of the key to use in the verification process format: int64 @@ -66762,6 +67692,10 @@ components: description: The message to be verified type: string x-go-name: Message + prehashed: + description: Markes that the message is already hashed + type: boolean + x-go-name: Prehashed signature: description: The message's signature type: string @@ -66775,6 +67709,11 @@ components: authentication type: string x-go-name: UIDToken + version: + description: The version of the key to use for verification + format: int32 + type: integer + x-go-name: Version required: - key-name - message @@ -66860,6 +67799,10 @@ components: description: The input message to verify in a base64 format type: string x-go-name: Message + prehashed: + description: Markes that the message is already hashed + type: boolean + x-go-name: Prehashed signature: description: The message's signature type: string @@ -66873,6 +67816,11 @@ components: authentication type: string x-go-name: UIDToken + version: + description: The version of the key to use for verification + format: int32 + type: integer + x-go-name: Version required: - message - signature diff --git a/build.gradle b/build.gradle index 7e9681b2..35d622b9 100644 --- a/build.gradle +++ b/build.gradle @@ -4,7 +4,7 @@ apply plugin: 'java' apply plugin: 'com.diffplug.spotless' group = 'io.akeyless' -version = '3.5.4' +version = '3.6.0' buildscript { repositories { diff --git a/build.sbt b/build.sbt index 91b59ba8..99769b62 100644 --- a/build.sbt +++ b/build.sbt @@ -2,7 +2,7 @@ lazy val root = (project in file(".")). settings( organization := "io.akeyless", name := "akeyless-java", - version := "3.5.4", + version := "3.6.0", scalaVersion := "2.11.4", scalacOptions ++= Seq("-feature"), javacOptions in compile ++= Seq("-Xlint:deprecation"), diff --git a/docs/AssocTargetItem.md b/docs/AssocTargetItem.md index b4a9b1c1..4ee840a8 100644 --- a/docs/AssocTargetItem.md +++ b/docs/AssocTargetItem.md @@ -8,6 +8,8 @@ assocTargetItem is a command that creates an association between target and item Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**certificatePath** | **String** | A path on the target to store the certificate pem file (relevant only for certificate provisioning) | [optional] +**chainPath** | **String** | A path on the target to store the full chain pem file (relevant only for certificate provisioning) | [optional] **disablePreviousKeyVersion** | **Boolean** | Automatically disable previous key version (required for azure targets) | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyOperations** | **List<String>** | A list of allowed operations for the key (required for azure targets) | [optional] @@ -16,9 +18,11 @@ Name | Type | Description | Notes **locationId** | **String** | Location id of the GCP KMS (required for gcp targets) | [optional] **multiRegion** | **String** | Set to 'true' to create a multi-region managed key. (Relevant only for Classic Key AWS targets) | [optional] **name** | **String** | The item to associate | +**privateKeyPath** | **String** | A path on the target to store the private key (relevant only for certificate provisioning) | [optional] **projectId** | **String** | Project id of the GCP KMS (required for gcp targets) | [optional] **purpose** | **String** | Purpose of the key in GCP KMS (required for gcp targets) | [optional] **regions** | **List<String>** | The list of regions to create a copy of the key in (relevant for aws targets) | [optional] +**sraAssociation** | **Boolean** | Is the target to associate is for sra, relevant only for linked target association for ldap rotated secret | [optional] **targetName** | **String** | The target to associate | **tenantSecretType** | **String** | The tenant secret type [Data/SearchIndex/Analytics] (required for salesforce targets) | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/AuthMethod.md b/docs/AuthMethod.md index d249f971..7e102625 100644 --- a/docs/AuthMethod.md +++ b/docs/AuthMethod.md @@ -17,6 +17,7 @@ Name | Type | Description | Notes **authMethodRolesAssoc** | [**List<AuthMethodRoleAssociation>**](AuthMethodRoleAssociation.md) | | [optional] **clientPermissions** | **List<String>** | | [optional] **creationDate** | **OffsetDateTime** | | [optional] +**description** | **String** | | [optional] **isApproved** | **Boolean** | | [optional] **modificationDate** | **OffsetDateTime** | | [optional] diff --git a/docs/CertificateChainInfo.md b/docs/CertificateChainInfo.md index 7ebc1c2f..aa657c02 100644 --- a/docs/CertificateChainInfo.md +++ b/docs/CertificateChainInfo.md @@ -9,6 +9,8 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **certificateChain** | [**List<CertificateInfo>**](CertificateInfo.md) | | [optional] **certificateFormat** | **String** | | [optional] +**certificateHasPrivateKey** | **Boolean** | | [optional] +**certificateIssuerGwClusterUrl** | **String** | | [optional] **certificateIssuerItemId** | **Long** | | [optional] **certificateIssuerName** | **String** | | [optional] **certificatePem** | **String** | | [optional] diff --git a/docs/CertificateVersionInfo.md b/docs/CertificateVersionInfo.md new file mode 100644 index 00000000..71d1356b --- /dev/null +++ b/docs/CertificateVersionInfo.md @@ -0,0 +1,15 @@ + + +# CertificateVersionInfo + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**notAfter** | **OffsetDateTime** | | [optional] +**notBefore** | **OffsetDateTime** | | [optional] +**status** | **String** | | [optional] + + + diff --git a/docs/Connect.md b/docs/Connect.md index a4f38ee7..478f9f53 100644 --- a/docs/Connect.md +++ b/docs/Connect.md @@ -20,7 +20,7 @@ Name | Type | Description | Notes **justification** | **String** | | [optional] **name** | **String** | The Secret name (for database and AWS producers - producer name) | [optional] **sshCommand** | **String** | Path to SSH executable. e.g. /usr/bin/ssh | [optional] -**sshExtraArgs** | **String** | The Use to add offical SSH arguments (except -i) | [optional] +**sshExtraArgs** | **String** | Additional SSH arguments (except -i) | [optional] **sshLegacySigningAlg** | **Boolean** | Set this option to output legacy ('ssh-rsa-cert-v01@openssh.com') signing algorithm name in the ssh certificate. | [optional] **target** | **String** | The target | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/CreateAuthMethod.md b/docs/CreateAuthMethod.md index 6517f8c7..16c382a8 100644 --- a/docs/CreateAuthMethod.md +++ b/docs/CreateAuthMethod.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/CreateAuthMethodAWSIAM.md b/docs/CreateAuthMethodAWSIAM.md index a4d9a24b..df26dd11 100644 --- a/docs/CreateAuthMethodAWSIAM.md +++ b/docs/CreateAuthMethodAWSIAM.md @@ -17,6 +17,7 @@ Name | Type | Description | Notes **boundRoleName** | **List<String>** | A list of full role-name that the access is restricted to | [optional] **boundUserId** | **List<String>** | A list of full user ids that the access is restricted to | [optional] **boundUserName** | **List<String>** | A list of full user-name that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/CreateAuthMethodAzureAD.md b/docs/CreateAuthMethodAzureAD.md index cf3181bc..b41034cc 100644 --- a/docs/CreateAuthMethodAzureAD.md +++ b/docs/CreateAuthMethodAzureAD.md @@ -9,7 +9,7 @@ createAuthMethodAzureAD is a command that creates a new auth method that will be Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] -**audience** | **String** | The audience in the JWT | [optional] +**audience** | **String** | Deprecated (Deprecated) The audience in the JWT | [optional] **boundGroupId** | **List<String>** | A list of group ids that the access is restricted to | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] **boundProviders** | **List<String>** | A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc) | [optional] @@ -20,6 +20,7 @@ Name | Type | Description | Notes **boundSpid** | **List<String>** | A list of service principal IDs that the access is restricted to | [optional] **boundSubId** | **List<String>** | A list of subscription ids that the access is restricted to | [optional] **boundTenantId** | **String** | The Azure tenant id that the access is restricted to | +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **issuer** | **String** | Issuer URL | [optional] diff --git a/docs/CreateAuthMethodCert.md b/docs/CreateAuthMethodCert.md index d3797401..31ea5e95 100644 --- a/docs/CreateAuthMethodCert.md +++ b/docs/CreateAuthMethodCert.md @@ -18,6 +18,7 @@ Name | Type | Description | Notes **boundOrganizationalUnits** | **List<String>** | A list of Organizational Units names. At least one must exist in the OU field. | [optional] **boundUriSans** | **List<String>** | A list of URIs. At least one must exist in the SANs. Supports globbing. | [optional] **certificateData** | **String** | The certificate data in base64, if no file was provided | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/CreateAuthMethodEmail.md b/docs/CreateAuthMethodEmail.md index cc072f6a..036238b9 100644 --- a/docs/CreateAuthMethodEmail.md +++ b/docs/CreateAuthMethodEmail.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **email** | **String** | An email address to be invited to have access | **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/CreateAuthMethodGCP.md b/docs/CreateAuthMethodGCP.md index 536a3c5c..1f0f7174 100644 --- a/docs/CreateAuthMethodGCP.md +++ b/docs/CreateAuthMethodGCP.md @@ -16,6 +16,7 @@ Name | Type | Description | Notes **boundRegions** | **List<String>** | List of regions that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored. | [optional] **boundServiceAccounts** | **List<String>** | List of service accounts the service account must be part of in order to be authenticated. | [optional] **boundZones** | **List<String>** | === Machine authentication section === List of zones that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone. | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/CreateAuthMethodHuawei.md b/docs/CreateAuthMethodHuawei.md index b6fbbee6..25a50bc1 100644 --- a/docs/CreateAuthMethodHuawei.md +++ b/docs/CreateAuthMethodHuawei.md @@ -17,6 +17,7 @@ Name | Type | Description | Notes **boundTenantName** | **List<String>** | A list of full tenant names that the access is restricted to | [optional] **boundUserId** | **List<String>** | A list of full user ids that the access is restricted to | [optional] **boundUserName** | **List<String>** | A list of full user-name that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/CreateAuthMethodK8S.md b/docs/CreateAuthMethodK8S.md index e3f793b0..5ac385ca 100644 --- a/docs/CreateAuthMethodK8S.md +++ b/docs/CreateAuthMethodK8S.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **boundNamespaces** | **List<String>** | A list of namespaces that the access is restricted to | [optional] **boundPodNames** | **List<String>** | A list of pod names that the access is restricted to | [optional] **boundSaNames** | **List<String>** | A list of service account names that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **genKey** | **String** | Automatically generate key-pair for K8S configuration. If set to false, a public key needs to be provided [true/false] | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/CreateAuthMethodLDAP.md b/docs/CreateAuthMethodLDAP.md index 02556dcb..4d242fa7 100644 --- a/docs/CreateAuthMethodLDAP.md +++ b/docs/CreateAuthMethodLDAP.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **genKey** | **String** | Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided [true/false] | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/CreateAuthMethodOAuth2.md b/docs/CreateAuthMethodOAuth2.md index 9be710ef..7410e4bf 100644 --- a/docs/CreateAuthMethodOAuth2.md +++ b/docs/CreateAuthMethodOAuth2.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **audience** | **String** | The audience in the JWT | [optional] **boundClientIds** | **List<String>** | The clients ids that the access is restricted to | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gatewayUrl** | **String** | Akeyless Gateway URL (Configuration Management port). Relevant only when the jwks-uri is accessible only from the gateway. | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/CreateAuthMethodOIDC.md b/docs/CreateAuthMethodOIDC.md index 8f478bda..ab5fcef0 100644 --- a/docs/CreateAuthMethodOIDC.md +++ b/docs/CreateAuthMethodOIDC.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] **clientId** | **String** | Client ID | [optional] **clientSecret** | **String** | Client Secret | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **issuer** | **String** | Issuer URL | [optional] diff --git a/docs/CreateAuthMethodSAML.md b/docs/CreateAuthMethodSAML.md index d5eba126..3768264e 100644 --- a/docs/CreateAuthMethodSAML.md +++ b/docs/CreateAuthMethodSAML.md @@ -11,6 +11,7 @@ Name | Type | Description | Notes **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **allowedRedirectUri** | **List<String>** | Allowed redirect URIs after the authentication | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **idpMetadataUrl** | **String** | IDP metadata url | [optional] diff --git a/docs/CreateAuthMethodUniversalIdentity.md b/docs/CreateAuthMethodUniversalIdentity.md index 35610fea..dad51366 100644 --- a/docs/CreateAuthMethodUniversalIdentity.md +++ b/docs/CreateAuthMethodUniversalIdentity.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] **denyInheritance** | **Boolean** | Deny from root to create children | [optional] **denyRotate** | **Boolean** | Deny from the token to rotate | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/CreateEventForwarder.md b/docs/CreateEventForwarder.md index 55d3fb38..d575dc1d 100644 --- a/docs/CreateEventForwarder.md +++ b/docs/CreateEventForwarder.md @@ -18,7 +18,7 @@ Name | Type | Description | Notes **emailTo** | **String** | A comma seperated list of email addresses to send event to (relevant only for \"email\" Event Forwarder) | [optional] **eventSourceLocations** | **List<String>** | Event sources | **eventSourceType** | **String** | Event Source type [item, target, auth_method, gateway] | [optional] -**eventTypes** | **List<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure] | [optional] +**eventTypes** | **List<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] **every** | **String** | Rate of periodic runner repetition in hours | [optional] **forwarderType** | **String** | | **host** | **String** | Workstation Host | [optional] diff --git a/docs/CreateLinkedTarget.md b/docs/CreateLinkedTarget.md index 9c527f89..c0b913e6 100644 --- a/docs/CreateLinkedTarget.md +++ b/docs/CreateLinkedTarget.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **name** | **String** | Target name | **parentTargetName** | **String** | The parent Target name | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**type** | **String** | Specifies the hosts type, relevant only when working without parent target | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/CreateRole.md b/docs/CreateRole.md index 23528712..91dbf26a 100644 --- a/docs/CreateRole.md +++ b/docs/CreateRole.md @@ -11,6 +11,8 @@ Name | Type | Description | Notes **auditAccess** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] **comment** | **String** | Deprecated - use description | [optional] **description** | **String** | Description of the object | [optional] +**eventCenterAccess** | **String** | Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported | [optional] +**eventForwardersAccess** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] **gwAnalyticsAccess** | **String** | Allow this role to view gw analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **name** | **String** | Role name | diff --git a/docs/CreateRotatedSecret.md b/docs/CreateRotatedSecret.md index 6649e51b..00911b93 100644 --- a/docs/CreateRotatedSecret.md +++ b/docs/CreateRotatedSecret.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**providerType** | **String** | | [optional] **apiId** | **String** | API ID to rotate (relevant only for rotator-type=api-key) | [optional] **apiKey** | **String** | API key to rotate (relevant only for rotator-type=api-key) | [optional] **applicationId** | **String** | ApplicationId (used in azure) | [optional] @@ -19,6 +20,7 @@ Name | Type | Description | Notes **gcpKey** | **String** | Base64-encoded service account private key text | [optional] **gcpServiceAccountEmail** | **String** | The email of the gcp service account to rotate | [optional] **gcpServiceAccountKeyId** | **String** | The key id of the gcp service account to rotate | [optional] +**hostProvider** | **String** | Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] **metadata** | **String** | Deprecated - use description | [optional] @@ -26,7 +28,7 @@ Name | Type | Description | Notes **rotateAfterDisconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional] **rotatedPassword** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] **rotatedUsername** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] -**rotationHour** | **Integer** | The Hour of the rotation in UTC | [optional] +**rotationHour** | **Integer** | The Hour of the rotation in UTC. Default rotation-hour is 14:00 | [optional] **rotationInterval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] **rotatorCredsType** | **String** | | [optional] **rotatorCustomCmd** | **String** | Custom rotation command (relevant only for ssh target) | [optional] @@ -49,6 +51,7 @@ Name | Type | Description | Notes **sshUsername** | **String** | Deprecated: use RotatedUser | [optional] **storageAccountKeyName** | **String** | The name of the storage account key to rotate [key1/key2/kerb1/kerb2] (relevat to azure-storage-account) | [optional] **tags** | **List<String>** | Add tags attached to this object | [optional] +**target** | **List<String>** | A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify multiple targets use argument multiple times | [optional] **targetName** | **String** | Target name | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/CreateSSHCertIssuer.md b/docs/CreateSSHCertIssuer.md index 58acf9fb..02b661eb 100644 --- a/docs/CreateSSHCertIssuer.md +++ b/docs/CreateSSHCertIssuer.md @@ -7,12 +7,12 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**sshCertIssuerHostProvider** | **String** | | [optional] +**providerType** | **String** | | [optional] **allowedUsers** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | **deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] **description** | **String** | Description of the object | [optional] **extensions** | **Map<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] -**hostProvider** | **String** | Host provider type [explicit/target] | [optional] +**hostProvider** | **String** | Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **metadata** | **String** | Deprecated - use description | [optional] **name** | **String** | SSH certificate issuer name | @@ -25,7 +25,7 @@ Name | Type | Description | Notes **secureAccessUseInternalBastion** | **Boolean** | Use internal SSH Bastion | [optional] **signerKeyName** | **String** | A key to sign the certificate with | **tag** | **List<String>** | List of the tags attached to this key | [optional] -**target** | **List<String>** | A list of existing targets to be associated, Relevant only for Secure Remote Access, To specify multiple targets use argument multiple times | [optional] +**target** | **List<String>** | A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify multiple targets use argument multiple times | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **ttl** | **Long** | The requested Time To Live for the certificate, in seconds | **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/CreateSecret.md b/docs/CreateSecret.md index a28d1eb2..b477bc50 100644 --- a/docs/CreateSecret.md +++ b/docs/CreateSecret.md @@ -8,6 +8,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessibility** | **String** | for personal password manager | [optional] +**changeEvent** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] **customField** | **Map<String, String>** | For Password Management use, additional fields | [optional] **deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] **description** | **String** | Description of the object | [optional] diff --git a/docs/GatewayCreateMigration.md b/docs/GatewayCreateMigration.md index 3497f347..6eb04ec2 100644 --- a/docs/GatewayCreateMigration.md +++ b/docs/GatewayCreateMigration.md @@ -63,6 +63,7 @@ Name | Type | Description | Notes **siRotationInterval** | **Integer** | The number of days to wait between every automatic rotation [1-365] (Relevant only for Server Inventory migration) | [optional] **siSraEnableRdp** | **String** | Enable/Disable RDP Secure Remote Access for the migrated local users rotated secrets. Default is false: rotated secrets will not be created with SRA (Relevant only for Server Inventory migration) | [optional] **siTargetName** | **String** | SSH, Windows or Linked Target Name. (Relevant only for Server Inventory migration) | +**siUserGroups** | **String** | Comma-separated list of groups to migrate users from. If empty, all users from all groups will be migrated (Relevant only for Server Inventory migration) | [optional] **siUsersIgnore** | **String** | Comma-separated list of Local Users which should not be migrated (Relevant only for Server Inventory migration) | [optional] **siUsersPathTemplate** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | **targetLocation** | **String** | Target location in Akeyless for imported secrets | diff --git a/docs/GatewayCreateProducerCassandra.md b/docs/GatewayCreateProducerCassandra.md index c6c5ea1a..557f3107 100644 --- a/docs/GatewayCreateProducerCassandra.md +++ b/docs/GatewayCreateProducerCassandra.md @@ -17,6 +17,8 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **name** | **String** | Producer name | **producerEncryptionKeyName** | **String** | Dynamic producer encryption key | [optional] +**ssl** | **Boolean** | Enable/Disable SSL [true/false] | [optional] +**sslCertificate** | **String** | SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA) | [optional] **tags** | **List<String>** | Add tags attached to this object | [optional] **targetName** | **String** | Target name | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/GatewayUpdateItem.md b/docs/GatewayUpdateItem.md index 6aea964c..281792da 100644 --- a/docs/GatewayUpdateItem.md +++ b/docs/GatewayUpdateItem.md @@ -11,6 +11,7 @@ Name | Type | Description | Notes **addTag** | **List<String>** | List of the new tags that will be attached to this item | [optional] **apiId** | **String** | API ID to rotate (relevant only for rotator-type=api-key) | [optional] **apiKey** | **String** | API key to rotate (relevant only for rotator-type=api-key) | [optional] +**appId** | **String** | ApplicationId (used in azure) | [optional] **autoRotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] **customPayload** | **String** | Secret payload to be sent with rotation request (relevant only for rotator-type=custom) | [optional] **deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] diff --git a/docs/GatewayUpdateMigration.md b/docs/GatewayUpdateMigration.md index 60aec8f1..8d497d9a 100644 --- a/docs/GatewayUpdateMigration.md +++ b/docs/GatewayUpdateMigration.md @@ -65,6 +65,7 @@ Name | Type | Description | Notes **siRotationInterval** | **Integer** | The number of days to wait between every automatic rotation [1-365] (Relevant only for Server Inventory migration) | [optional] **siSraEnableRdp** | **String** | Enable/Disable RDP Secure Remote Access for the migrated local users rotated secrets. Default is false: rotated secrets will not be created with SRA (Relevant only for Server Inventory migration) | [optional] **siTargetName** | **String** | SSH, Windows or Linked Target Name. (Relevant only for Server Inventory migration) | +**siUserGroups** | **String** | Comma-separated list of groups to migrate users from. If empty, all users from all groups will be migrated (Relevant only for Server Inventory migration) | [optional] **siUsersIgnore** | **String** | Comma-separated list of Local Users which should not be migrated (Relevant only for Server Inventory migration) | [optional] **siUsersPathTemplate** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | **targetLocation** | **String** | Target location in Akeyless for imported secrets | diff --git a/docs/GatewayUpdateProducerCassandra.md b/docs/GatewayUpdateProducerCassandra.md index 86beed5b..f4f370ae 100644 --- a/docs/GatewayUpdateProducerCassandra.md +++ b/docs/GatewayUpdateProducerCassandra.md @@ -18,6 +18,8 @@ Name | Type | Description | Notes **name** | **String** | Producer name | **newName** | **String** | Producer name | [optional] **producerEncryptionKeyName** | **String** | Dynamic producer encryption key | [optional] +**ssl** | **Boolean** | Enable/Disable SSL [true/false] | [optional] +**sslCertificate** | **String** | SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA) | [optional] **tags** | **List<String>** | Add tags attached to this object | [optional] **targetName** | **String** | Target name | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/GenerateCsr.md b/docs/GenerateCsr.md index 96674a1f..ea664a31 100644 --- a/docs/GenerateCsr.md +++ b/docs/GenerateCsr.md @@ -20,7 +20,7 @@ Name | Type | Description | Notes **ipAddresses** | **String** | A comma-separated list of ip addresses alternative names | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyType** | **String** | The type of the key to generate (classic-key/dfc) | -**name** | **String** | The classic key name | +**name** | **String** | The key name | **org** | **String** | The organization to be included in the CSR certificate | [optional] **splitLevel** | **Long** | The number of fragments that the item will be split into (not includes customer fragment) | [optional] **state** | **String** | The state to be included in the CSR certificate | [optional] diff --git a/docs/GwClusterIdentity.md b/docs/GwClusterIdentity.md index b5012623..a5581400 100644 --- a/docs/GwClusterIdentity.md +++ b/docs/GwClusterIdentity.md @@ -19,6 +19,7 @@ Name | Type | Description | Notes **defaultSecretLocation** | **String** | | [optional] **displayName** | **String** | | [optional] **id** | **Long** | | [optional] +**serverlessType** | **String** | | [optional] **status** | **String** | | [optional] **statusDescription** | **String** | | [optional] diff --git a/docs/ImportPasswords.md b/docs/ImportPasswords.md index f99fb0ea..8f25c0b4 100644 --- a/docs/ImportPasswords.md +++ b/docs/ImportPasswords.md @@ -16,6 +16,7 @@ Name | Type | Description | Notes **targetFolder** | **String** | Target folder for imported passwords | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**updateMode** | **String** | | [optional] diff --git a/docs/ImportPasswordsOutput.md b/docs/ImportPasswordsOutput.md index 51d56d01..27bce591 100644 --- a/docs/ImportPasswordsOutput.md +++ b/docs/ImportPasswordsOutput.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **imported** | **Integer** | | [optional] **passwordsInFile** | **Long** | | [optional] **successfullyParsed** | **Long** | | [optional] +**updated** | **Integer** | | [optional] diff --git a/docs/ItemVersion.md b/docs/ItemVersion.md index 6fe20e62..214906f9 100644 --- a/docs/ItemVersion.md +++ b/docs/ItemVersion.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessDate** | **OffsetDateTime** | | [optional] **accessDateDisplay** | **String** | | [optional] +**certificateVersionInfo** | [**CertificateVersionInfo**](CertificateVersionInfo.md) | | [optional] **creationDate** | **OffsetDateTime** | | [optional] **customerFragmentId** | **String** | | [optional] **deletionDate** | **OffsetDateTime** | | [optional] diff --git a/docs/ProvisionCertificate.md b/docs/ProvisionCertificate.md new file mode 100644 index 00000000..0b9118a7 --- /dev/null +++ b/docs/ProvisionCertificate.md @@ -0,0 +1,19 @@ + + +# ProvisionCertificate + +provisionCertificate is a command that provisions a certificate content to a target + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**displayId** | **String** | Certificate display ID | [optional] +**itemId** | **Long** | Certificate item ID | [optional] +**json** | **Boolean** | Set output format to JSON | [optional] +**name** | **String** | Certificate name | +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] + + + diff --git a/docs/ProvisionCertificateOutput.md b/docs/ProvisionCertificateOutput.md new file mode 100644 index 00000000..78d77922 --- /dev/null +++ b/docs/ProvisionCertificateOutput.md @@ -0,0 +1,16 @@ + + +# ProvisionCertificateOutput + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**failMessage** | **String** | | [optional] +**successMessage** | **String** | | [optional] +**hostNames** | **List<String>** | | [optional] +**provisionedAt** | **OffsetDateTime** | | [optional] + + + diff --git a/docs/RenewCertificate.md b/docs/RenewCertificate.md new file mode 100644 index 00000000..26aa223e --- /dev/null +++ b/docs/RenewCertificate.md @@ -0,0 +1,18 @@ + + +# RenewCertificate + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**generateKey** | **Boolean** | Generate a new key as part of the certificate renewal | [optional] +**itemId** | **Long** | Certificate item id | [optional] +**json** | **Boolean** | Set output format to JSON | [optional] +**name** | **String** | Certificate name | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] + + + diff --git a/docs/RenewCertificateOutput.md b/docs/RenewCertificateOutput.md new file mode 100644 index 00000000..529ae4d0 --- /dev/null +++ b/docs/RenewCertificateOutput.md @@ -0,0 +1,18 @@ + + +# RenewCertificateOutput + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cert** | **String** | | [optional] +**certDisplayId** | **String** | | [optional] +**itemId** | **String** | | [optional] +**parentCert** | **String** | | [optional] +**privateKey** | **String** | | [optional] +**readingToken** | **String** | | [optional] + + + diff --git a/docs/SecureRemoteAccess.md b/docs/SecureRemoteAccess.md index e6c69a7b..9e393c03 100644 --- a/docs/SecureRemoteAccess.md +++ b/docs/SecureRemoteAccess.md @@ -35,6 +35,7 @@ Name | Type | Description | Notes **sshPrivateKey** | **Boolean** | | [optional] **sshUser** | **String** | | [optional] **targetHosts** | [**List<TargetNameWithHosts>**](TargetNameWithHosts.md) | | [optional] +**targets** | **List<String>** | | [optional] **url** | **String** | | [optional] **useInternalBastion** | **Boolean** | | [optional] **webProxy** | **Boolean** | | [optional] diff --git a/docs/ServerInventoryPayload.md b/docs/ServerInventoryPayload.md index 2196457e..1f52eeb7 100644 --- a/docs/ServerInventoryPayload.md +++ b/docs/ServerInventoryPayload.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **enableRdpSra** | **Boolean** | | [optional] **migrationTargetId** | **Long** | | [optional] **serverTargetsPathTemplate** | **String** | | [optional] +**userGroups** | **List<String>** | | [optional] **usersIgnoreList** | **Map<String, Boolean>** | | [optional] **usersRotatedSecretsPathTemplate** | **String** | | [optional] diff --git a/docs/SetRoleRule.md b/docs/SetRoleRule.md index 396fe94d..896645d0 100644 --- a/docs/SetRoleRule.md +++ b/docs/SetRoleRule.md @@ -11,7 +11,7 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **path** | **String** | The path the rule refers to | **roleName** | **String** | The role name to be updated | -**ruleType** | **String** | item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule or sra-reports-rule | [optional] +**ruleType** | **String** | item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule or sra-reports-rule, sra-rule | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **ttl** | **Integer** | RoleRule ttl | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/SignDataWithClassicKey.md b/docs/SignDataWithClassicKey.md index d8df550a..7a4aaff4 100644 --- a/docs/SignDataWithClassicKey.md +++ b/docs/SignDataWithClassicKey.md @@ -11,6 +11,7 @@ Name | Type | Description | Notes **displayId** | **String** | The name of the key to use in the sign data process | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional] **hashingMethod** | **String** | HashingMethod | [optional] +**ignoreCache** | **String** | Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **name** | **String** | ClassicKey name | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/SignEcDsa.md b/docs/SignEcDsa.md index ba45eaae..89028d31 100644 --- a/docs/SignEcDsa.md +++ b/docs/SignEcDsa.md @@ -13,8 +13,10 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keyName** | **String** | The name of the EC key to use for the signing process | [optional] **message** | **String** | The input message to sign in a base64 format | +**prehashed** | **Boolean** | Markes that the message is already hashed | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**version** | **Integer** | The version of the key to use for signing | [optional] diff --git a/docs/SignPKCS1.md b/docs/SignPKCS1.md index bacb5a6f..ee535c8d 100644 --- a/docs/SignPKCS1.md +++ b/docs/SignPKCS1.md @@ -9,12 +9,16 @@ signPKCS1 is a command that calculates the signature of hashed data using RSASSA Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **displayId** | **String** | The display id of the key to use in the signing process | [optional] +**hashFunction** | **String** | HashFunction defines the hash function (e.g. sha-256) | [optional] +**inputFormat** | **String** | Select default assumed format for the plaintext message. Currently supported options: [base64] | [optional] **itemId** | **Long** | The item id of the key to use in the signing process | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyName** | **String** | The name of the RSA key to use in the signing process | [optional] **message** | **String** | The message to be signed | +**prehashed** | **Boolean** | Markes that the message is already hashed | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**version** | **Integer** | The version of the key to use for signing | [optional] diff --git a/docs/SignPKCS1Output.md b/docs/SignPKCS1Output.md index 5de60cce..2e53dc06 100644 --- a/docs/SignPKCS1Output.md +++ b/docs/SignPKCS1Output.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**result** | **List<Integer>** | | [optional] +**result** | **String** | | [optional] diff --git a/docs/SignRsaSsaPss.md b/docs/SignRsaSsaPss.md index 5a2e7172..080a40d9 100644 --- a/docs/SignRsaSsaPss.md +++ b/docs/SignRsaSsaPss.md @@ -14,8 +14,10 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keyName** | **String** | The name of the RSA key to use in the signing process | [optional] **message** | **String** | The input message to sign in a base64 format | +**prehashed** | **Boolean** | Markes that the message is already hashed | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**version** | **Integer** | The version of the key to use for signing | [optional] diff --git a/docs/StaticSecretDetailsInfo.md b/docs/StaticSecretDetailsInfo.md index d0816089..3418618d 100644 --- a/docs/StaticSecretDetailsInfo.md +++ b/docs/StaticSecretDetailsInfo.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**notifyOnChangeEvent** | **Boolean** | | [optional] **username** | **String** | | [optional] **website** | **String** | deprecated | [optional] **websites** | **List<String>** | | [optional] diff --git a/docs/TargetItemVersion.md b/docs/TargetItemVersion.md index 00c0ee75..bf714a34 100644 --- a/docs/TargetItemVersion.md +++ b/docs/TargetItemVersion.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessDate** | **OffsetDateTime** | | [optional] **accessDateDisplay** | **String** | | [optional] +**certificateVersionInfo** | [**CertificateVersionInfo**](CertificateVersionInfo.md) | | [optional] **creationDate** | **OffsetDateTime** | | [optional] **customerFragmentId** | **String** | | [optional] **deletionDate** | **OffsetDateTime** | | [optional] diff --git a/docs/UpdateAuthMethod.md b/docs/UpdateAuthMethod.md index 6857b2d8..119206ea 100644 --- a/docs/UpdateAuthMethod.md +++ b/docs/UpdateAuthMethod.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/UpdateAuthMethodAWSIAM.md b/docs/UpdateAuthMethodAWSIAM.md index 390a0d1a..79c28a64 100644 --- a/docs/UpdateAuthMethodAWSIAM.md +++ b/docs/UpdateAuthMethodAWSIAM.md @@ -17,6 +17,7 @@ Name | Type | Description | Notes **boundRoleName** | **List<String>** | A list of full role-name that the access is restricted to | [optional] **boundUserId** | **List<String>** | A list of full user ids that the access is restricted to | [optional] **boundUserName** | **List<String>** | A list of full user-name that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/UpdateAuthMethodAzureAD.md b/docs/UpdateAuthMethodAzureAD.md index 873b0a61..7dd6b6c1 100644 --- a/docs/UpdateAuthMethodAzureAD.md +++ b/docs/UpdateAuthMethodAzureAD.md @@ -9,7 +9,7 @@ updateAuthMethodAzureAD is a command that updates a new auth method that will be Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] -**audience** | **String** | The audience in the JWT | [optional] +**audience** | **String** | Deprecated (Deprecated) The audience in the JWT | [optional] **boundGroupId** | **List<String>** | A list of group ids that the access is restricted to | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] **boundProviders** | **List<String>** | A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc) | [optional] @@ -20,6 +20,7 @@ Name | Type | Description | Notes **boundSpid** | **List<String>** | A list of service principal IDs that the access is restricted to | [optional] **boundSubId** | **List<String>** | A list of subscription ids that the access is restricted to | [optional] **boundTenantId** | **String** | The Azure tenant id that the access is restricted to | +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **issuer** | **String** | Issuer URL | [optional] diff --git a/docs/UpdateAuthMethodCert.md b/docs/UpdateAuthMethodCert.md index 1e1bc9ae..e415bbba 100644 --- a/docs/UpdateAuthMethodCert.md +++ b/docs/UpdateAuthMethodCert.md @@ -18,6 +18,7 @@ Name | Type | Description | Notes **boundOrganizationalUnits** | **List<String>** | A list of Organizational Units names. At least one must exist in the OU field. | [optional] **boundUriSans** | **List<String>** | A list of URIs. At least one must exist in the SANs. Supports globbing. | [optional] **certificateData** | **String** | The certificate data in base64, if no file was provided | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/UpdateAuthMethodGCP.md b/docs/UpdateAuthMethodGCP.md index 3dd41edf..7eee4049 100644 --- a/docs/UpdateAuthMethodGCP.md +++ b/docs/UpdateAuthMethodGCP.md @@ -16,6 +16,7 @@ Name | Type | Description | Notes **boundRegions** | **List<String>** | List of regions that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored. | [optional] **boundServiceAccounts** | **List<String>** | List of service accounts the service account must be part of in order to be authenticated. | [optional] **boundZones** | **List<String>** | === Machine authentication section === List of zones that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone. | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/UpdateAuthMethodK8S.md b/docs/UpdateAuthMethodK8S.md index 02d922b4..f0d868ea 100644 --- a/docs/UpdateAuthMethodK8S.md +++ b/docs/UpdateAuthMethodK8S.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **boundNamespaces** | **List<String>** | A list of namespaces that the access is restricted to | [optional] **boundPodNames** | **List<String>** | A list of pod names that the access is restricted to | [optional] **boundSaNames** | **List<String>** | A list of service account names that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **genKey** | **String** | Automatically generate key-pair for K8S configuration. If set to false, a public key needs to be provided [true/false] | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/UpdateAuthMethodLDAP.md b/docs/UpdateAuthMethodLDAP.md index ef0fffda..86b352df 100644 --- a/docs/UpdateAuthMethodLDAP.md +++ b/docs/UpdateAuthMethodLDAP.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **genKey** | **String** | Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided [true/false] | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/UpdateAuthMethodOAuth2.md b/docs/UpdateAuthMethodOAuth2.md index 28ad9612..46ed9d43 100644 --- a/docs/UpdateAuthMethodOAuth2.md +++ b/docs/UpdateAuthMethodOAuth2.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **audience** | **String** | The audience in the JWT | [optional] **boundClientIds** | **List<String>** | The clients ids that the access is restricted to | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gatewayUrl** | **String** | Akeyless Gateway URL (Configuration Management port). Relevant only when the jwks-uri is accessible only from the gateway. | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] diff --git a/docs/UpdateAuthMethodOIDC.md b/docs/UpdateAuthMethodOIDC.md index 73b6c5a4..e37a2c70 100644 --- a/docs/UpdateAuthMethodOIDC.md +++ b/docs/UpdateAuthMethodOIDC.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] **clientId** | **String** | Client ID | [optional] **clientSecret** | **String** | Client Secret | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **issuer** | **String** | Issuer URL | [optional] diff --git a/docs/UpdateAuthMethodSAML.md b/docs/UpdateAuthMethodSAML.md index 9c0261ae..f9e52145 100644 --- a/docs/UpdateAuthMethodSAML.md +++ b/docs/UpdateAuthMethodSAML.md @@ -11,6 +11,7 @@ Name | Type | Description | Notes **accessExpires** | **Long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] **allowedRedirectUri** | **List<String>** | Allowed redirect URIs after the authentication | [optional] **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **idpMetadataUrl** | **String** | IDP metadata url | [optional] diff --git a/docs/UpdateAuthMethodUniversalIdentity.md b/docs/UpdateAuthMethodUniversalIdentity.md index 3f9818d0..3dc33945 100644 --- a/docs/UpdateAuthMethodUniversalIdentity.md +++ b/docs/UpdateAuthMethodUniversalIdentity.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **boundIps** | **List<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] **denyInheritance** | **Boolean** | Deny from root to create children | [optional] **denyRotate** | **Boolean** | Deny from the token to rotate | [optional] +**description** | **String** | Auth Method description | [optional] **forceSubClaims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] **gwBoundIps** | **List<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] **json** | **Boolean** | Set output format to JSON | [optional] diff --git a/docs/UpdateCertificateValue.md b/docs/UpdateCertificateValue.md index 39392e7d..0243c688 100644 --- a/docs/UpdateCertificateValue.md +++ b/docs/UpdateCertificateValue.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **expirationEventIn** | **List<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] **format** | **String** | CertificateFormat of the certificate and private key, possible values: cer,crt,pem,pfx,p12. Required when passing inline certificate content with --certificate-data or --key-data, otherwise format is derived from the file extension. | [optional] **json** | **Boolean** | Set output format to JSON | [optional] +**keepPrevVersion** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] **key** | **String** | The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used) | [optional] **keyData** | **String** | Content of the certificate's private key in a Base64 format. | [optional] **metadata** | **String** | Deprecated - use description | [optional] diff --git a/docs/UpdateItem.md b/docs/UpdateItem.md index c4f63510..504a6d87 100644 --- a/docs/UpdateItem.md +++ b/docs/UpdateItem.md @@ -7,11 +7,14 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**providerType** | **String** | | [optional] **accessibility** | **String** | for personal password manager | [optional] **addTag** | **List<String>** | List of the new tags that will be attached to this item | [optional] **certFileData** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**changeEvent** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] **deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] **description** | **String** | Description of the object | [optional] +**hostProvider** | **String** | Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **name** | **String** | Current item name | **newMetadata** | **String** | Deprecated - use description | [optional] diff --git a/docs/UpdateLinkedTarget.md b/docs/UpdateLinkedTarget.md index 9e2d4eda..cd73e12c 100644 --- a/docs/UpdateLinkedTarget.md +++ b/docs/UpdateLinkedTarget.md @@ -17,6 +17,7 @@ Name | Type | Description | Notes **parentTargetName** | **String** | The parent Target name | [optional] **rmHosts** | **String** | Comma separated list of existing hosts that will be removed from Linked Target hosts. | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**type** | **String** | Specifies the hosts type, relevant only when working without parent target | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/UpdateRole.md b/docs/UpdateRole.md index c97f425e..6c02c6c0 100644 --- a/docs/UpdateRole.md +++ b/docs/UpdateRole.md @@ -10,6 +10,8 @@ Name | Type | Description | Notes **analyticsAccess** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] **auditAccess** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] **description** | **String** | Description of the object | [optional] +**eventCenterAccess** | **String** | Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported | [optional] +**eventForwarderAccess** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] **gwAnalyticsAccess** | **String** | Allow this role to view gw analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **name** | **String** | Role name | diff --git a/docs/UpdateSSHCertIssuer.md b/docs/UpdateSSHCertIssuer.md index 9c24dfd2..bc38307c 100644 --- a/docs/UpdateSSHCertIssuer.md +++ b/docs/UpdateSSHCertIssuer.md @@ -7,13 +7,13 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**sshCertIssuerHostProvider** | **String** | | [optional] +**providerType** | **String** | | [optional] **addTag** | **List<String>** | List of the new tags that will be attached to this item | [optional] **allowedUsers** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | **deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] **description** | **String** | Description of the object | [optional] **extensions** | **Map<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] -**hostProvider** | **String** | Host provider type [explicit/target] | [optional] +**hostProvider** | **String** | Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **metadata** | **String** | Deprecated - use description | [optional] **name** | **String** | SSH certificate issuer name | diff --git a/docs/UpdateSecretVal.md b/docs/UpdateSecretVal.md index 6526fcc9..d5f896ed 100644 --- a/docs/UpdateSecretVal.md +++ b/docs/UpdateSecretVal.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keepPrevVersion** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] +**lastVersion** | **Integer** | The last version number before the update | [optional] **multiline** | **Boolean** | The provided value is a multiline value (separated by '\\n') | [optional] **name** | **String** | Secret name | **newVersion** | **Boolean** | Deprecated | [optional] diff --git a/docs/V2Api.md b/docs/V2Api.md index e5c1bd87..34779cfa 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -219,8 +219,10 @@ Method | HTTP request | Description [**listSharedItems**](V2Api.md#listSharedItems) | **POST** /list-shared-items | [**listTargets**](V2Api.md#listTargets) | **POST** /list-targets | [**moveObjects**](V2Api.md#moveObjects) | **POST** /move-objects | +[**provisionCertificate**](V2Api.md#provisionCertificate) | **POST** /provision-certificate | [**rawCreds**](V2Api.md#rawCreds) | **POST** /raw-creds | [**refreshKey**](V2Api.md#refreshKey) | **POST** /refresh-key | +[**renewCertificate**](V2Api.md#renewCertificate) | **POST** /renew-certificate | [**requestAccess**](V2Api.md#requestAccess) | **POST** /request-access | [**reverseRBAC**](V2Api.md#reverseRBAC) | **POST** /reverse-rbac | [**revokeCreds**](V2Api.md#revokeCreds) | **POST** /revoke-creds | @@ -288,7 +290,7 @@ Method | HTTP request | Description [**updateRabbitMQTargetDetails**](V2Api.md#updateRabbitMQTargetDetails) | **POST** /update-rabbitmq-target-details | [**updateRole**](V2Api.md#updateRole) | **POST** /update-role | [**updateRotatedSecret**](V2Api.md#updateRotatedSecret) | **POST** /update-rotated-secret | -[**updateRotationSettings**](V2Api.md#updateRotationSettings) | **POST** /update-rotation-settingsrotate-key | +[**updateRotationSettings**](V2Api.md#updateRotationSettings) | **POST** /update-rotation-settings | [**updateSSHCertIssuer**](V2Api.md#updateSSHCertIssuer) | **POST** /update-ssh-cert-issuer | [**updateSSHTarget**](V2Api.md#updateSSHTarget) | **POST** /update-ssh-target | [**updateSSHTargetDetails**](V2Api.md#updateSSHTargetDetails) | **POST** /update-ssh-target-details | @@ -13426,6 +13428,67 @@ No authorization required **200** | moveObjectsResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **provisionCertificate** +> ProvisionCertificateOutput provisionCertificate(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + ProvisionCertificate body = new ProvisionCertificate(); // ProvisionCertificate | + try { + ProvisionCertificateOutput result = apiInstance.provisionCertificate(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#provisionCertificate"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ProvisionCertificate**](ProvisionCertificate.md)| | + +### Return type + +[**ProvisionCertificateOutput**](ProvisionCertificateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | provisionCertificateResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **rawCreds** > SystemAccessCredentialsReplyObj rawCreds(body) @@ -13548,6 +13611,67 @@ No authorization required **200** | refreshKeyResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **renewCertificate** +> RenewCertificateOutput renewCertificate(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + RenewCertificate body = new RenewCertificate(); // RenewCertificate | + try { + RenewCertificateOutput result = apiInstance.renewCertificate(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#renewCertificate"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**RenewCertificate**](RenewCertificate.md)| | + +### Return type + +[**RenewCertificateOutput**](RenewCertificateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | renewCertificateResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **requestAccess** > RequestAccessOutput requestAccess(body) @@ -13809,7 +13933,7 @@ public class Example { defaultClient.setBasePath("https://api.akeyless.io"); V2Api apiInstance = new V2Api(defaultClient); - UpdateRotationSettings body = new UpdateRotationSettings(); // UpdateRotationSettings | + RotateKey body = new RotateKey(); // RotateKey | try { RotateKeyOutput result = apiInstance.rotateKey(body); System.out.println(result); @@ -13828,7 +13952,7 @@ public class Example { Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **body** | [**UpdateRotationSettings**](UpdateRotationSettings.md)| | + **body** | [**RotateKey**](RotateKey.md)| | ### Return type @@ -17632,7 +17756,7 @@ No authorization required # **updateRotationSettings** -> RotateKeyOutput updateRotationSettings() +> RotateKeyOutput updateRotationSettings(body) @@ -17651,8 +17775,9 @@ public class Example { defaultClient.setBasePath("https://api.akeyless.io"); V2Api apiInstance = new V2Api(defaultClient); + UpdateRotationSettings body = new UpdateRotationSettings(); // UpdateRotationSettings | try { - RotateKeyOutput result = apiInstance.updateRotationSettings(); + RotateKeyOutput result = apiInstance.updateRotationSettings(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling V2Api#updateRotationSettings"); @@ -17666,7 +17791,10 @@ public class Example { ``` ### Parameters -This endpoint does not need any parameter. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**UpdateRotationSettings**](UpdateRotationSettings.md)| | ### Return type @@ -17678,7 +17806,7 @@ No authorization required ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json ### HTTP response details diff --git a/docs/VerifyEcDsa.md b/docs/VerifyEcDsa.md index e8037d33..627fba01 100644 --- a/docs/VerifyEcDsa.md +++ b/docs/VerifyEcDsa.md @@ -13,9 +13,11 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keyName** | **String** | The name of the EC key to use for the verification process | [optional] **message** | **String** | The message to be verified in a base64 format | +**prehashed** | **Boolean** | Markes that the message is already hashed | [optional] **signature** | **String** | The message's signature | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**version** | **Integer** | The version of the key to use for verification | [optional] diff --git a/docs/VerifyPKCS1.md b/docs/VerifyPKCS1.md index 6e9797fc..618676e5 100644 --- a/docs/VerifyPKCS1.md +++ b/docs/VerifyPKCS1.md @@ -8,13 +8,17 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **displayId** | **String** | The display id of the key to use in the verification process | [optional] +**hashFunction** | **String** | HashFunction defines the hash function (e.g. sha-256) | [optional] +**inputFormat** | **String** | Select default assumed format for the plaintext message. Currently supported options: [base64] | [optional] **itemId** | **Long** | The item id of the key to use in the verification process | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyName** | **String** | The name of the RSA key to use in the verification process | **message** | **String** | The message to be verified | +**prehashed** | **Boolean** | Markes that the message is already hashed | [optional] **signature** | **String** | The message's signature | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**version** | **Integer** | The version of the key to use for verification | [optional] diff --git a/docs/VerifyRsaSsaPss.md b/docs/VerifyRsaSsaPss.md index aaab2c6d..3c207e91 100644 --- a/docs/VerifyRsaSsaPss.md +++ b/docs/VerifyRsaSsaPss.md @@ -14,9 +14,11 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keyName** | **String** | The name of the RSA key to use in the verification process | [optional] **message** | **String** | The input message to verify in a base64 format | +**prehashed** | **Boolean** | Markes that the message is already hashed | [optional] **signature** | **String** | The message's signature | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**version** | **Integer** | The version of the key to use for verification | [optional] diff --git a/pom.xml b/pom.xml index d0785fd1..75eb6cb2 100644 --- a/pom.xml +++ b/pom.xml @@ -5,7 +5,7 @@ akeyless-java jar akeyless-java - 3.5.4 + 3.6.0 https://github.com/akeylesslabs/akeyless-java Akeyless Java SDK diff --git a/src/main/java/io/akeyless/client/ApiClient.java b/src/main/java/io/akeyless/client/ApiClient.java index de0027c9..cd640be4 100644 --- a/src/main/java/io/akeyless/client/ApiClient.java +++ b/src/main/java/io/akeyless/client/ApiClient.java @@ -129,7 +129,7 @@ private void init() { json = new JSON(); // Set default User-Agent. - setUserAgent("OpenAPI-Generator/3.5.4/java"); + setUserAgent("OpenAPI-Generator/3.6.0/java"); authentications = new HashMap(); } diff --git a/src/main/java/io/akeyless/client/api/V2Api.java b/src/main/java/io/akeyless/client/api/V2Api.java index 44242dfb..fe50d738 100644 --- a/src/main/java/io/akeyless/client/api/V2Api.java +++ b/src/main/java/io/akeyless/client/api/V2Api.java @@ -425,9 +425,13 @@ import io.akeyless.client.model.ListTargetsOutput; import io.akeyless.client.model.MigrationStatusReplyObj; import io.akeyless.client.model.MoveObjects; +import io.akeyless.client.model.ProvisionCertificate; +import io.akeyless.client.model.ProvisionCertificateOutput; import io.akeyless.client.model.RawCreds; import io.akeyless.client.model.RefreshKey; import io.akeyless.client.model.RefreshKeyOutput; +import io.akeyless.client.model.RenewCertificate; +import io.akeyless.client.model.RenewCertificateOutput; import io.akeyless.client.model.RequestAccess; import io.akeyless.client.model.RequestAccessOutput; import io.akeyless.client.model.ReverseRBAC; @@ -436,6 +440,7 @@ import io.akeyless.client.model.RoleAssociationDetails; import io.akeyless.client.model.RollbackSecret; import io.akeyless.client.model.RollbackSecretOutput; +import io.akeyless.client.model.RotateKey; import io.akeyless.client.model.RotateKeyOutput; import io.akeyless.client.model.RotateOidcClientOutput; import io.akeyless.client.model.RotateOidcClientSecret; @@ -28697,6 +28702,137 @@ public okhttp3.Call moveObjectsAsync(MoveObjects body, final ApiCallback localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } + /** + * Build call for provisionCertificate + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 provisionCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call provisionCertificateCall(ProvisionCertificate body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/provision-certificate"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call provisionCertificateValidateBeforeCall(ProvisionCertificate body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling provisionCertificate(Async)"); + } + + + okhttp3.Call localVarCall = provisionCertificateCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return ProvisionCertificateOutput + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 provisionCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ProvisionCertificateOutput provisionCertificate(ProvisionCertificate body) throws ApiException { + ApiResponse localVarResp = provisionCertificateWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<ProvisionCertificateOutput> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 provisionCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse provisionCertificateWithHttpInfo(ProvisionCertificate body) throws ApiException { + okhttp3.Call localVarCall = provisionCertificateValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 provisionCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call provisionCertificateAsync(ProvisionCertificate body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = provisionCertificateValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for rawCreds * @param body (optional) @@ -28954,6 +29090,137 @@ public okhttp3.Call refreshKeyAsync(RefreshKey body, final ApiCallback + Status Code Description Response Headers + 200 renewCertificateResponse wraps response body. - + 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - + + */ + public okhttp3.Call renewCertificateCall(RenewCertificate body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/renew-certificate"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call renewCertificateValidateBeforeCall(RenewCertificate body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling renewCertificate(Async)"); + } + + + okhttp3.Call localVarCall = renewCertificateCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return RenewCertificateOutput + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 renewCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public RenewCertificateOutput renewCertificate(RenewCertificate body) throws ApiException { + ApiResponse localVarResp = renewCertificateWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<RenewCertificateOutput> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 renewCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse renewCertificateWithHttpInfo(RenewCertificate body) throws ApiException { + okhttp3.Call localVarCall = renewCertificateValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 renewCertificateResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call renewCertificateAsync(RenewCertificate body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = renewCertificateValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for requestAccess * @param body (required) @@ -29482,7 +29749,7 @@ public okhttp3.Call rollbackSecretAsync(RollbackSecret body, final ApiCallback 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call rotateKeyCall(UpdateRotationSettings body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call rotateKeyCall(RotateKey body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers @@ -29529,7 +29796,7 @@ public okhttp3.Call rotateKeyCall(UpdateRotationSettings body, final ApiCallback } @SuppressWarnings("rawtypes") - private okhttp3.Call rotateKeyValidateBeforeCall(UpdateRotationSettings body, final ApiCallback _callback) throws ApiException { + private okhttp3.Call rotateKeyValidateBeforeCall(RotateKey body, final ApiCallback _callback) throws ApiException { // verify the required parameter 'body' is set if (body == null) { @@ -29555,7 +29822,7 @@ private okhttp3.Call rotateKeyValidateBeforeCall(UpdateRotationSettings body, fi 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public RotateKeyOutput rotateKey(UpdateRotationSettings body) throws ApiException { + public RotateKeyOutput rotateKey(RotateKey body) throws ApiException { ApiResponse localVarResp = rotateKeyWithHttpInfo(body); return localVarResp.getData(); } @@ -29573,7 +29840,7 @@ public RotateKeyOutput rotateKey(UpdateRotationSettings body) throws ApiExceptio 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public ApiResponse rotateKeyWithHttpInfo(UpdateRotationSettings body) throws ApiException { + public ApiResponse rotateKeyWithHttpInfo(RotateKey body) throws ApiException { okhttp3.Call localVarCall = rotateKeyValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); @@ -29593,7 +29860,7 @@ public ApiResponse rotateKeyWithHttpInfo(UpdateRotationSettings 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call rotateKeyAsync(UpdateRotationSettings body, final ApiCallback _callback) throws ApiException { + public okhttp3.Call rotateKeyAsync(RotateKey body, final ApiCallback _callback) throws ApiException { okhttp3.Call localVarCall = rotateKeyValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); @@ -37720,6 +37987,7 @@ public okhttp3.Call updateRotatedSecretAsync(UpdateRotatedSecret body, final Api } /** * Build call for updateRotationSettings + * @param body (required) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -37730,7 +37998,7 @@ public okhttp3.Call updateRotatedSecretAsync(UpdateRotatedSecret body, final Api 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call updateRotationSettingsCall(final ApiCallback _callback) throws ApiException { + public okhttp3.Call updateRotationSettingsCall(UpdateRotationSettings body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers @@ -37745,10 +38013,10 @@ public okhttp3.Call updateRotationSettingsCall(final ApiCallback _callback) thro basePath = null; } - Object localVarPostBody = null; + Object localVarPostBody = body; // create path and map variables - String localVarPath = "/update-rotation-settingsrotate-key"; + String localVarPath = "/update-rotation-settings"; List localVarQueryParams = new ArrayList(); List localVarCollectionQueryParams = new ArrayList(); @@ -37765,7 +38033,7 @@ public okhttp3.Call updateRotationSettingsCall(final ApiCallback _callback) thro } final String[] localVarContentTypes = { - + "application/json" }; final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); if (localVarContentType != null) { @@ -37777,10 +38045,15 @@ public okhttp3.Call updateRotationSettingsCall(final ApiCallback _callback) thro } @SuppressWarnings("rawtypes") - private okhttp3.Call updateRotationSettingsValidateBeforeCall(final ApiCallback _callback) throws ApiException { + private okhttp3.Call updateRotationSettingsValidateBeforeCall(UpdateRotationSettings body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling updateRotationSettings(Async)"); + } - okhttp3.Call localVarCall = updateRotationSettingsCall(_callback); + okhttp3.Call localVarCall = updateRotationSettingsCall(body, _callback); return localVarCall; } @@ -37788,6 +38061,7 @@ private okhttp3.Call updateRotationSettingsValidateBeforeCall(final ApiCallback /** * * + * @param body (required) * @return RotateKeyOutput * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -37797,14 +38071,15 @@ private okhttp3.Call updateRotationSettingsValidateBeforeCall(final ApiCallback 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public RotateKeyOutput updateRotationSettings() throws ApiException { - ApiResponse localVarResp = updateRotationSettingsWithHttpInfo(); + public RotateKeyOutput updateRotationSettings(UpdateRotationSettings body) throws ApiException { + ApiResponse localVarResp = updateRotationSettingsWithHttpInfo(body); return localVarResp.getData(); } /** * * + * @param body (required) * @return ApiResponse<RotateKeyOutput> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -37814,8 +38089,8 @@ public RotateKeyOutput updateRotationSettings() throws ApiException { 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public ApiResponse updateRotationSettingsWithHttpInfo() throws ApiException { - okhttp3.Call localVarCall = updateRotationSettingsValidateBeforeCall(null); + public ApiResponse updateRotationSettingsWithHttpInfo(UpdateRotationSettings body) throws ApiException { + okhttp3.Call localVarCall = updateRotationSettingsValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -37823,6 +38098,7 @@ public ApiResponse updateRotationSettingsWithHttpInfo() throws /** * (asynchronously) * + * @param body (required) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -37833,9 +38109,9 @@ public ApiResponse updateRotationSettingsWithHttpInfo() throws 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call updateRotationSettingsAsync(final ApiCallback _callback) throws ApiException { + public okhttp3.Call updateRotationSettingsAsync(UpdateRotationSettings body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = updateRotationSettingsValidateBeforeCall(_callback); + okhttp3.Call localVarCall = updateRotationSettingsValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; diff --git a/src/main/java/io/akeyless/client/model/AssocTargetItem.java b/src/main/java/io/akeyless/client/model/AssocTargetItem.java index 8385a2cb..7b4fc333 100644 --- a/src/main/java/io/akeyless/client/model/AssocTargetItem.java +++ b/src/main/java/io/akeyless/client/model/AssocTargetItem.java @@ -32,6 +32,14 @@ @ApiModel(description = "assocTargetItem is a command that creates an association between target and item.") @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class AssocTargetItem { + public static final String SERIALIZED_NAME_CERTIFICATE_PATH = "certificate-path"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_PATH) + private String certificatePath; + + public static final String SERIALIZED_NAME_CHAIN_PATH = "chain-path"; + @SerializedName(SERIALIZED_NAME_CHAIN_PATH) + private String chainPath; + public static final String SERIALIZED_NAME_DISABLE_PREVIOUS_KEY_VERSION = "disable-previous-key-version"; @SerializedName(SERIALIZED_NAME_DISABLE_PREVIOUS_KEY_VERSION) private Boolean disablePreviousKeyVersion = false; @@ -64,6 +72,10 @@ public class AssocTargetItem { @SerializedName(SERIALIZED_NAME_NAME) private String name; + public static final String SERIALIZED_NAME_PRIVATE_KEY_PATH = "private-key-path"; + @SerializedName(SERIALIZED_NAME_PRIVATE_KEY_PATH) + private String privateKeyPath; + public static final String SERIALIZED_NAME_PROJECT_ID = "project-id"; @SerializedName(SERIALIZED_NAME_PROJECT_ID) private String projectId; @@ -76,6 +88,10 @@ public class AssocTargetItem { @SerializedName(SERIALIZED_NAME_REGIONS) private List regions = null; + public static final String SERIALIZED_NAME_SRA_ASSOCIATION = "sra-association"; + @SerializedName(SERIALIZED_NAME_SRA_ASSOCIATION) + private Boolean sraAssociation = false; + public static final String SERIALIZED_NAME_TARGET_NAME = "target-name"; @SerializedName(SERIALIZED_NAME_TARGET_NAME) private String targetName; @@ -99,6 +115,52 @@ public class AssocTargetItem { public AssocTargetItem() { } + public AssocTargetItem certificatePath(String certificatePath) { + + this.certificatePath = certificatePath; + return this; + } + + /** + * A path on the target to store the certificate pem file (relevant only for certificate provisioning) + * @return certificatePath + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A path on the target to store the certificate pem file (relevant only for certificate provisioning)") + + public String getCertificatePath() { + return certificatePath; + } + + + public void setCertificatePath(String certificatePath) { + this.certificatePath = certificatePath; + } + + + public AssocTargetItem chainPath(String chainPath) { + + this.chainPath = chainPath; + return this; + } + + /** + * A path on the target to store the full chain pem file (relevant only for certificate provisioning) + * @return chainPath + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A path on the target to store the full chain pem file (relevant only for certificate provisioning)") + + public String getChainPath() { + return chainPath; + } + + + public void setChainPath(String chainPath) { + this.chainPath = chainPath; + } + + public AssocTargetItem disablePreviousKeyVersion(Boolean disablePreviousKeyVersion) { this.disablePreviousKeyVersion = disablePreviousKeyVersion; @@ -291,6 +353,29 @@ public void setName(String name) { } + public AssocTargetItem privateKeyPath(String privateKeyPath) { + + this.privateKeyPath = privateKeyPath; + return this; + } + + /** + * A path on the target to store the private key (relevant only for certificate provisioning) + * @return privateKeyPath + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A path on the target to store the private key (relevant only for certificate provisioning)") + + public String getPrivateKeyPath() { + return privateKeyPath; + } + + + public void setPrivateKeyPath(String privateKeyPath) { + this.privateKeyPath = privateKeyPath; + } + + public AssocTargetItem projectId(String projectId) { this.projectId = projectId; @@ -368,6 +453,29 @@ public void setRegions(List regions) { } + public AssocTargetItem sraAssociation(Boolean sraAssociation) { + + this.sraAssociation = sraAssociation; + return this; + } + + /** + * Is the target to associate is for sra, relevant only for linked target association for ldap rotated secret + * @return sraAssociation + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Is the target to associate is for sra, relevant only for linked target association for ldap rotated secret") + + public Boolean getSraAssociation() { + return sraAssociation; + } + + + public void setSraAssociation(Boolean sraAssociation) { + this.sraAssociation = sraAssociation; + } + + public AssocTargetItem targetName(String targetName) { this.targetName = targetName; @@ -492,7 +600,9 @@ public boolean equals(Object o) { return false; } AssocTargetItem assocTargetItem = (AssocTargetItem) o; - return Objects.equals(this.disablePreviousKeyVersion, assocTargetItem.disablePreviousKeyVersion) && + return Objects.equals(this.certificatePath, assocTargetItem.certificatePath) && + Objects.equals(this.chainPath, assocTargetItem.chainPath) && + Objects.equals(this.disablePreviousKeyVersion, assocTargetItem.disablePreviousKeyVersion) && Objects.equals(this.json, assocTargetItem.json) && Objects.equals(this.keyOperations, assocTargetItem.keyOperations) && Objects.equals(this.keyringName, assocTargetItem.keyringName) && @@ -500,9 +610,11 @@ public boolean equals(Object o) { Objects.equals(this.locationId, assocTargetItem.locationId) && Objects.equals(this.multiRegion, assocTargetItem.multiRegion) && Objects.equals(this.name, assocTargetItem.name) && + Objects.equals(this.privateKeyPath, assocTargetItem.privateKeyPath) && Objects.equals(this.projectId, assocTargetItem.projectId) && Objects.equals(this.purpose, assocTargetItem.purpose) && Objects.equals(this.regions, assocTargetItem.regions) && + Objects.equals(this.sraAssociation, assocTargetItem.sraAssociation) && Objects.equals(this.targetName, assocTargetItem.targetName) && Objects.equals(this.tenantSecretType, assocTargetItem.tenantSecretType) && Objects.equals(this.token, assocTargetItem.token) && @@ -512,13 +624,15 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(disablePreviousKeyVersion, json, keyOperations, keyringName, kmsAlgorithm, locationId, multiRegion, name, projectId, purpose, regions, targetName, tenantSecretType, token, uidToken, vaultName); + return Objects.hash(certificatePath, chainPath, disablePreviousKeyVersion, json, keyOperations, keyringName, kmsAlgorithm, locationId, multiRegion, name, privateKeyPath, projectId, purpose, regions, sraAssociation, targetName, tenantSecretType, token, uidToken, vaultName); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class AssocTargetItem {\n"); + sb.append(" certificatePath: ").append(toIndentedString(certificatePath)).append("\n"); + sb.append(" chainPath: ").append(toIndentedString(chainPath)).append("\n"); sb.append(" disablePreviousKeyVersion: ").append(toIndentedString(disablePreviousKeyVersion)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyOperations: ").append(toIndentedString(keyOperations)).append("\n"); @@ -527,9 +641,11 @@ public String toString() { sb.append(" locationId: ").append(toIndentedString(locationId)).append("\n"); sb.append(" multiRegion: ").append(toIndentedString(multiRegion)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); + sb.append(" privateKeyPath: ").append(toIndentedString(privateKeyPath)).append("\n"); sb.append(" projectId: ").append(toIndentedString(projectId)).append("\n"); sb.append(" purpose: ").append(toIndentedString(purpose)).append("\n"); sb.append(" regions: ").append(toIndentedString(regions)).append("\n"); + sb.append(" sraAssociation: ").append(toIndentedString(sraAssociation)).append("\n"); sb.append(" targetName: ").append(toIndentedString(targetName)).append("\n"); sb.append(" tenantSecretType: ").append(toIndentedString(tenantSecretType)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/AuthMethod.java b/src/main/java/io/akeyless/client/model/AuthMethod.java index 4969199e..a0c2026b 100644 --- a/src/main/java/io/akeyless/client/model/AuthMethod.java +++ b/src/main/java/io/akeyless/client/model/AuthMethod.java @@ -74,6 +74,10 @@ public class AuthMethod { @SerializedName(SERIALIZED_NAME_CREATION_DATE) private OffsetDateTime creationDate; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_IS_APPROVED = "is_approved"; @SerializedName(SERIALIZED_NAME_IS_APPROVED) private Boolean isApproved; @@ -339,6 +343,29 @@ public void setCreationDate(OffsetDateTime creationDate) { } + public AuthMethod description(String description) { + + this.description = description; + return this; + } + + /** + * Get description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public AuthMethod isApproved(Boolean isApproved) { this.isApproved = isApproved; @@ -404,13 +431,14 @@ public boolean equals(Object o) { Objects.equals(this.authMethodRolesAssoc, authMethod.authMethodRolesAssoc) && Objects.equals(this.clientPermissions, authMethod.clientPermissions) && Objects.equals(this.creationDate, authMethod.creationDate) && + Objects.equals(this.description, authMethod.description) && Objects.equals(this.isApproved, authMethod.isApproved) && Objects.equals(this.modificationDate, authMethod.modificationDate); } @Override public int hashCode() { - return Objects.hash(accessDate, accessDateDisplay, accessInfo, accountId, associatedGwIds, authMethodAccessId, authMethodName, authMethodRolesAssoc, clientPermissions, creationDate, isApproved, modificationDate); + return Objects.hash(accessDate, accessDateDisplay, accessInfo, accountId, associatedGwIds, authMethodAccessId, authMethodName, authMethodRolesAssoc, clientPermissions, creationDate, description, isApproved, modificationDate); } @Override @@ -427,6 +455,7 @@ public String toString() { sb.append(" authMethodRolesAssoc: ").append(toIndentedString(authMethodRolesAssoc)).append("\n"); sb.append(" clientPermissions: ").append(toIndentedString(clientPermissions)).append("\n"); sb.append(" creationDate: ").append(toIndentedString(creationDate)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" isApproved: ").append(toIndentedString(isApproved)).append("\n"); sb.append(" modificationDate: ").append(toIndentedString(modificationDate)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/CertificateChainInfo.java b/src/main/java/io/akeyless/client/model/CertificateChainInfo.java index 4af51d95..c1c78255 100644 --- a/src/main/java/io/akeyless/client/model/CertificateChainInfo.java +++ b/src/main/java/io/akeyless/client/model/CertificateChainInfo.java @@ -41,6 +41,14 @@ public class CertificateChainInfo { @SerializedName(SERIALIZED_NAME_CERTIFICATE_FORMAT) private String certificateFormat; + public static final String SERIALIZED_NAME_CERTIFICATE_HAS_PRIVATE_KEY = "certificate_has_private_key"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_HAS_PRIVATE_KEY) + private Boolean certificateHasPrivateKey; + + public static final String SERIALIZED_NAME_CERTIFICATE_ISSUER_GW_CLUSTER_URL = "certificate_issuer_gw_cluster_url"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_ISSUER_GW_CLUSTER_URL) + private String certificateIssuerGwClusterUrl; + public static final String SERIALIZED_NAME_CERTIFICATE_ISSUER_ITEM_ID = "certificate_issuer_item_id"; @SerializedName(SERIALIZED_NAME_CERTIFICATE_ISSUER_ITEM_ID) private Long certificateIssuerItemId; @@ -118,6 +126,52 @@ public void setCertificateFormat(String certificateFormat) { } + public CertificateChainInfo certificateHasPrivateKey(Boolean certificateHasPrivateKey) { + + this.certificateHasPrivateKey = certificateHasPrivateKey; + return this; + } + + /** + * Get certificateHasPrivateKey + * @return certificateHasPrivateKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getCertificateHasPrivateKey() { + return certificateHasPrivateKey; + } + + + public void setCertificateHasPrivateKey(Boolean certificateHasPrivateKey) { + this.certificateHasPrivateKey = certificateHasPrivateKey; + } + + + public CertificateChainInfo certificateIssuerGwClusterUrl(String certificateIssuerGwClusterUrl) { + + this.certificateIssuerGwClusterUrl = certificateIssuerGwClusterUrl; + return this; + } + + /** + * Get certificateIssuerGwClusterUrl + * @return certificateIssuerGwClusterUrl + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getCertificateIssuerGwClusterUrl() { + return certificateIssuerGwClusterUrl; + } + + + public void setCertificateIssuerGwClusterUrl(String certificateIssuerGwClusterUrl) { + this.certificateIssuerGwClusterUrl = certificateIssuerGwClusterUrl; + } + + public CertificateChainInfo certificateIssuerItemId(Long certificateIssuerItemId) { this.certificateIssuerItemId = certificateIssuerItemId; @@ -252,6 +306,8 @@ public boolean equals(Object o) { CertificateChainInfo certificateChainInfo = (CertificateChainInfo) o; return Objects.equals(this.certificateChain, certificateChainInfo.certificateChain) && Objects.equals(this.certificateFormat, certificateChainInfo.certificateFormat) && + Objects.equals(this.certificateHasPrivateKey, certificateChainInfo.certificateHasPrivateKey) && + Objects.equals(this.certificateIssuerGwClusterUrl, certificateChainInfo.certificateIssuerGwClusterUrl) && Objects.equals(this.certificateIssuerItemId, certificateChainInfo.certificateIssuerItemId) && Objects.equals(this.certificateIssuerName, certificateChainInfo.certificateIssuerName) && Objects.equals(this.certificatePem, certificateChainInfo.certificatePem) && @@ -261,7 +317,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(certificateChain, certificateFormat, certificateIssuerItemId, certificateIssuerName, certificatePem, certificateStatus, expirationEvents); + return Objects.hash(certificateChain, certificateFormat, certificateHasPrivateKey, certificateIssuerGwClusterUrl, certificateIssuerItemId, certificateIssuerName, certificatePem, certificateStatus, expirationEvents); } @Override @@ -270,6 +326,8 @@ public String toString() { sb.append("class CertificateChainInfo {\n"); sb.append(" certificateChain: ").append(toIndentedString(certificateChain)).append("\n"); sb.append(" certificateFormat: ").append(toIndentedString(certificateFormat)).append("\n"); + sb.append(" certificateHasPrivateKey: ").append(toIndentedString(certificateHasPrivateKey)).append("\n"); + sb.append(" certificateIssuerGwClusterUrl: ").append(toIndentedString(certificateIssuerGwClusterUrl)).append("\n"); sb.append(" certificateIssuerItemId: ").append(toIndentedString(certificateIssuerItemId)).append("\n"); sb.append(" certificateIssuerName: ").append(toIndentedString(certificateIssuerName)).append("\n"); sb.append(" certificatePem: ").append(toIndentedString(certificatePem)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CertificateVersionInfo.java b/src/main/java/io/akeyless/client/model/CertificateVersionInfo.java new file mode 100644 index 00000000..98a4480d --- /dev/null +++ b/src/main/java/io/akeyless/client/model/CertificateVersionInfo.java @@ -0,0 +1,159 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.threeten.bp.OffsetDateTime; + +/** + * CertificateVersionInfo + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class CertificateVersionInfo { + public static final String SERIALIZED_NAME_NOT_AFTER = "not_after"; + @SerializedName(SERIALIZED_NAME_NOT_AFTER) + private OffsetDateTime notAfter; + + public static final String SERIALIZED_NAME_NOT_BEFORE = "not_before"; + @SerializedName(SERIALIZED_NAME_NOT_BEFORE) + private OffsetDateTime notBefore; + + public static final String SERIALIZED_NAME_STATUS = "status"; + @SerializedName(SERIALIZED_NAME_STATUS) + private String status; + + public CertificateVersionInfo() { + } + + public CertificateVersionInfo notAfter(OffsetDateTime notAfter) { + + this.notAfter = notAfter; + return this; + } + + /** + * Get notAfter + * @return notAfter + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public OffsetDateTime getNotAfter() { + return notAfter; + } + + + public void setNotAfter(OffsetDateTime notAfter) { + this.notAfter = notAfter; + } + + + public CertificateVersionInfo notBefore(OffsetDateTime notBefore) { + + this.notBefore = notBefore; + return this; + } + + /** + * Get notBefore + * @return notBefore + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public OffsetDateTime getNotBefore() { + return notBefore; + } + + + public void setNotBefore(OffsetDateTime notBefore) { + this.notBefore = notBefore; + } + + + public CertificateVersionInfo status(String status) { + + this.status = status; + return this; + } + + /** + * Get status + * @return status + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getStatus() { + return status; + } + + + public void setStatus(String status) { + this.status = status; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + CertificateVersionInfo certificateVersionInfo = (CertificateVersionInfo) o; + return Objects.equals(this.notAfter, certificateVersionInfo.notAfter) && + Objects.equals(this.notBefore, certificateVersionInfo.notBefore) && + Objects.equals(this.status, certificateVersionInfo.status); + } + + @Override + public int hashCode() { + return Objects.hash(notAfter, notBefore, status); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class CertificateVersionInfo {\n"); + sb.append(" notAfter: ").append(toIndentedString(notAfter)).append("\n"); + sb.append(" notBefore: ").append(toIndentedString(notBefore)).append("\n"); + sb.append(" status: ").append(toIndentedString(status)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/Connect.java b/src/main/java/io/akeyless/client/model/Connect.java index 07704a5b..d518d9f8 100644 --- a/src/main/java/io/akeyless/client/model/Connect.java +++ b/src/main/java/io/akeyless/client/model/Connect.java @@ -392,11 +392,11 @@ public Connect sshExtraArgs(String sshExtraArgs) { } /** - * The Use to add offical SSH arguments (except -i) + * Additional SSH arguments (except -i) * @return sshExtraArgs **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The Use to add offical SSH arguments (except -i)") + @ApiModelProperty(value = "Additional SSH arguments (except -i)") public String getSshExtraArgs() { return sshExtraArgs; diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethod.java b/src/main/java/io/akeyless/client/model/CreateAuthMethod.java index afc4d945..6a4fc9b7 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethod.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethod.java @@ -39,6 +39,10 @@ public class CreateAuthMethod { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -124,6 +128,29 @@ public void setBoundIps(List boundIps) { } + public CreateAuthMethod description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethod forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -304,6 +331,7 @@ public boolean equals(Object o) { CreateAuthMethod createAuthMethod = (CreateAuthMethod) o; return Objects.equals(this.accessExpires, createAuthMethod.accessExpires) && Objects.equals(this.boundIps, createAuthMethod.boundIps) && + Objects.equals(this.description, createAuthMethod.description) && Objects.equals(this.forceSubClaims, createAuthMethod.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethod.gwBoundIps) && Objects.equals(this.json, createAuthMethod.json) && @@ -315,7 +343,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, uidToken); + return Objects.hash(accessExpires, boundIps, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, uidToken); } @Override @@ -324,6 +352,7 @@ public String toString() { sb.append("class CreateAuthMethod {\n"); sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodAWSIAM.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodAWSIAM.java index 91522578..cef5d6a3 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodAWSIAM.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodAWSIAM.java @@ -68,6 +68,10 @@ public class CreateAuthMethodAWSIAM { @SerializedName(SERIALIZED_NAME_BOUND_USER_NAME) private List boundUserName = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -371,6 +375,29 @@ public void setBoundUserName(List boundUserName) { } + public CreateAuthMethodAWSIAM description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodAWSIAM forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -581,6 +608,7 @@ public boolean equals(Object o) { Objects.equals(this.boundRoleName, createAuthMethodAWSIAM.boundRoleName) && Objects.equals(this.boundUserId, createAuthMethodAWSIAM.boundUserId) && Objects.equals(this.boundUserName, createAuthMethodAWSIAM.boundUserName) && + Objects.equals(this.description, createAuthMethodAWSIAM.description) && Objects.equals(this.forceSubClaims, createAuthMethodAWSIAM.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodAWSIAM.gwBoundIps) && Objects.equals(this.json, createAuthMethodAWSIAM.json) && @@ -593,7 +621,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundArn, boundAwsAccountId, boundIps, boundResourceId, boundRoleId, boundRoleName, boundUserId, boundUserName, forceSubClaims, gwBoundIps, json, jwtTtl, name, stsUrl, token, uidToken); + return Objects.hash(accessExpires, boundArn, boundAwsAccountId, boundIps, boundResourceId, boundRoleId, boundRoleName, boundUserId, boundUserName, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, stsUrl, token, uidToken); } @Override @@ -609,6 +637,7 @@ public String toString() { sb.append(" boundRoleName: ").append(toIndentedString(boundRoleName)).append("\n"); sb.append(" boundUserId: ").append(toIndentedString(boundUserId)).append("\n"); sb.append(" boundUserName: ").append(toIndentedString(boundUserName)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodAzureAD.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodAzureAD.java index 11bf34d3..8bdffdcb 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodAzureAD.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodAzureAD.java @@ -80,6 +80,10 @@ public class CreateAuthMethodAzureAD { @SerializedName(SERIALIZED_NAME_BOUND_TENANT_ID) private String boundTenantId; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -149,11 +153,11 @@ public CreateAuthMethodAzureAD audience(String audience) { } /** - * The audience in the JWT + * Deprecated (Deprecated) The audience in the JWT * @return audience **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The audience in the JWT") + @ApiModelProperty(value = "Deprecated (Deprecated) The audience in the JWT") public String getAudience() { return audience; @@ -467,6 +471,29 @@ public void setBoundTenantId(String boundTenantId) { } + public CreateAuthMethodAzureAD description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodAzureAD forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -703,6 +730,7 @@ public boolean equals(Object o) { Objects.equals(this.boundSpid, createAuthMethodAzureAD.boundSpid) && Objects.equals(this.boundSubId, createAuthMethodAzureAD.boundSubId) && Objects.equals(this.boundTenantId, createAuthMethodAzureAD.boundTenantId) && + Objects.equals(this.description, createAuthMethodAzureAD.description) && Objects.equals(this.forceSubClaims, createAuthMethodAzureAD.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodAzureAD.gwBoundIps) && Objects.equals(this.issuer, createAuthMethodAzureAD.issuer) && @@ -716,7 +744,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundGroupId, boundIps, boundProviders, boundResourceId, boundResourceNames, boundResourceTypes, boundRgId, boundSpid, boundSubId, boundTenantId, forceSubClaims, gwBoundIps, issuer, json, jwksUri, jwtTtl, name, token, uidToken); + return Objects.hash(accessExpires, audience, boundGroupId, boundIps, boundProviders, boundResourceId, boundResourceNames, boundResourceTypes, boundRgId, boundSpid, boundSubId, boundTenantId, description, forceSubClaims, gwBoundIps, issuer, json, jwksUri, jwtTtl, name, token, uidToken); } @Override @@ -735,6 +763,7 @@ public String toString() { sb.append(" boundSpid: ").append(toIndentedString(boundSpid)).append("\n"); sb.append(" boundSubId: ").append(toIndentedString(boundSubId)).append("\n"); sb.append(" boundTenantId: ").append(toIndentedString(boundTenantId)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" issuer: ").append(toIndentedString(issuer)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodCert.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodCert.java index 67005947..341d3ca2 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodCert.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodCert.java @@ -72,6 +72,10 @@ public class CreateAuthMethodCert { @SerializedName(SERIALIZED_NAME_CERTIFICATE_DATA) private String certificateData; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -397,6 +401,29 @@ public void setCertificateData(String certificateData) { } + public CreateAuthMethodCert description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodCert forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -639,6 +666,7 @@ public boolean equals(Object o) { Objects.equals(this.boundOrganizationalUnits, createAuthMethodCert.boundOrganizationalUnits) && Objects.equals(this.boundUriSans, createAuthMethodCert.boundUriSans) && Objects.equals(this.certificateData, createAuthMethodCert.certificateData) && + Objects.equals(this.description, createAuthMethodCert.description) && Objects.equals(this.forceSubClaims, createAuthMethodCert.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodCert.gwBoundIps) && Objects.equals(this.json, createAuthMethodCert.json) && @@ -652,7 +680,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, allowedCors, boundCommonNames, boundDnsSans, boundEmailSans, boundExtensions, boundIps, boundOrganizationalUnits, boundUriSans, certificateData, forceSubClaims, gwBoundIps, json, jwtTtl, name, revokedCertIds, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, allowedCors, boundCommonNames, boundDnsSans, boundEmailSans, boundExtensions, boundIps, boundOrganizationalUnits, boundUriSans, certificateData, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, revokedCertIds, token, uidToken, uniqueIdentifier); } @Override @@ -669,6 +697,7 @@ public String toString() { sb.append(" boundOrganizationalUnits: ").append(toIndentedString(boundOrganizationalUnits)).append("\n"); sb.append(" boundUriSans: ").append(toIndentedString(boundUriSans)).append("\n"); sb.append(" certificateData: ").append(toIndentedString(certificateData)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodEmail.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodEmail.java index c3823abc..dc9c1c9b 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodEmail.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodEmail.java @@ -40,6 +40,10 @@ public class CreateAuthMethodEmail { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_EMAIL = "email"; @SerializedName(SERIALIZED_NAME_EMAIL) private String email; @@ -129,6 +133,29 @@ public void setBoundIps(List boundIps) { } + public CreateAuthMethodEmail description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodEmail email(String email) { this.email = email; @@ -332,6 +359,7 @@ public boolean equals(Object o) { CreateAuthMethodEmail createAuthMethodEmail = (CreateAuthMethodEmail) o; return Objects.equals(this.accessExpires, createAuthMethodEmail.accessExpires) && Objects.equals(this.boundIps, createAuthMethodEmail.boundIps) && + Objects.equals(this.description, createAuthMethodEmail.description) && Objects.equals(this.email, createAuthMethodEmail.email) && Objects.equals(this.forceSubClaims, createAuthMethodEmail.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodEmail.gwBoundIps) && @@ -344,7 +372,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, email, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, uidToken); + return Objects.hash(accessExpires, boundIps, description, email, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, uidToken); } @Override @@ -353,6 +381,7 @@ public String toString() { sb.append("class CreateAuthMethodEmail {\n"); sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" email: ").append(toIndentedString(email)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodGCP.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodGCP.java index ecab1946..fa6d1084 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodGCP.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodGCP.java @@ -64,6 +64,10 @@ public class CreateAuthMethodGCP { @SerializedName(SERIALIZED_NAME_BOUND_ZONES) private List boundZones = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -335,6 +339,29 @@ public void setBoundZones(List boundZones) { } + public CreateAuthMethodGCP description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodGCP forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -567,6 +594,7 @@ public boolean equals(Object o) { Objects.equals(this.boundRegions, createAuthMethodGCP.boundRegions) && Objects.equals(this.boundServiceAccounts, createAuthMethodGCP.boundServiceAccounts) && Objects.equals(this.boundZones, createAuthMethodGCP.boundZones) && + Objects.equals(this.description, createAuthMethodGCP.description) && Objects.equals(this.forceSubClaims, createAuthMethodGCP.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodGCP.gwBoundIps) && Objects.equals(this.json, createAuthMethodGCP.json) && @@ -580,7 +608,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundIps, boundLabels, boundProjects, boundRegions, boundServiceAccounts, boundZones, forceSubClaims, gwBoundIps, json, jwtTtl, name, serviceAccountCredsData, token, type, uidToken); + return Objects.hash(accessExpires, audience, boundIps, boundLabels, boundProjects, boundRegions, boundServiceAccounts, boundZones, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, serviceAccountCredsData, token, type, uidToken); } @Override @@ -595,6 +623,7 @@ public String toString() { sb.append(" boundRegions: ").append(toIndentedString(boundRegions)).append("\n"); sb.append(" boundServiceAccounts: ").append(toIndentedString(boundServiceAccounts)).append("\n"); sb.append(" boundZones: ").append(toIndentedString(boundZones)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodHuawei.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodHuawei.java index 86f1849b..c4880e7e 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodHuawei.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodHuawei.java @@ -68,6 +68,10 @@ public class CreateAuthMethodHuawei { @SerializedName(SERIALIZED_NAME_BOUND_USER_NAME) private List boundUserName = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -362,6 +366,29 @@ public void setBoundUserName(List boundUserName) { } + public CreateAuthMethodHuawei description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodHuawei forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -549,6 +576,7 @@ public boolean equals(Object o) { Objects.equals(this.boundTenantName, createAuthMethodHuawei.boundTenantName) && Objects.equals(this.boundUserId, createAuthMethodHuawei.boundUserId) && Objects.equals(this.boundUserName, createAuthMethodHuawei.boundUserName) && + Objects.equals(this.description, createAuthMethodHuawei.description) && Objects.equals(this.forceSubClaims, createAuthMethodHuawei.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodHuawei.gwBoundIps) && Objects.equals(this.json, createAuthMethodHuawei.json) && @@ -560,7 +588,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, authUrl, boundDomainId, boundDomainName, boundIps, boundTenantId, boundTenantName, boundUserId, boundUserName, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, uidToken); + return Objects.hash(accessExpires, authUrl, boundDomainId, boundDomainName, boundIps, boundTenantId, boundTenantName, boundUserId, boundUserName, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, uidToken); } @Override @@ -576,6 +604,7 @@ public String toString() { sb.append(" boundTenantName: ").append(toIndentedString(boundTenantName)).append("\n"); sb.append(" boundUserId: ").append(toIndentedString(boundUserId)).append("\n"); sb.append(" boundUserName: ").append(toIndentedString(boundUserName)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodK8S.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodK8S.java index 29441b8c..6b2d7955 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodK8S.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodK8S.java @@ -56,6 +56,10 @@ public class CreateAuthMethodK8S { @SerializedName(SERIALIZED_NAME_BOUND_SA_NAMES) private List boundSaNames = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -265,6 +269,29 @@ public void setBoundSaNames(List boundSaNames) { } + public CreateAuthMethodK8S description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodK8S forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -495,6 +522,7 @@ public boolean equals(Object o) { Objects.equals(this.boundNamespaces, createAuthMethodK8S.boundNamespaces) && Objects.equals(this.boundPodNames, createAuthMethodK8S.boundPodNames) && Objects.equals(this.boundSaNames, createAuthMethodK8S.boundSaNames) && + Objects.equals(this.description, createAuthMethodK8S.description) && Objects.equals(this.forceSubClaims, createAuthMethodK8S.forceSubClaims) && Objects.equals(this.genKey, createAuthMethodK8S.genKey) && Objects.equals(this.gwBoundIps, createAuthMethodK8S.gwBoundIps) && @@ -508,7 +536,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundIps, boundNamespaces, boundPodNames, boundSaNames, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, publicKey, token, uidToken); + return Objects.hash(accessExpires, audience, boundIps, boundNamespaces, boundPodNames, boundSaNames, description, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, publicKey, token, uidToken); } @Override @@ -521,6 +549,7 @@ public String toString() { sb.append(" boundNamespaces: ").append(toIndentedString(boundNamespaces)).append("\n"); sb.append(" boundPodNames: ").append(toIndentedString(boundPodNames)).append("\n"); sb.append(" boundSaNames: ").append(toIndentedString(boundSaNames)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" genKey: ").append(toIndentedString(genKey)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodLDAP.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodLDAP.java index c915f1d7..e9a48dd6 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodLDAP.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodLDAP.java @@ -40,6 +40,10 @@ public class CreateAuthMethodLDAP { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -137,6 +141,29 @@ public void setBoundIps(List boundIps) { } + public CreateAuthMethodLDAP description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodLDAP forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -386,6 +413,7 @@ public boolean equals(Object o) { CreateAuthMethodLDAP createAuthMethodLDAP = (CreateAuthMethodLDAP) o; return Objects.equals(this.accessExpires, createAuthMethodLDAP.accessExpires) && Objects.equals(this.boundIps, createAuthMethodLDAP.boundIps) && + Objects.equals(this.description, createAuthMethodLDAP.description) && Objects.equals(this.forceSubClaims, createAuthMethodLDAP.forceSubClaims) && Objects.equals(this.genKey, createAuthMethodLDAP.genKey) && Objects.equals(this.gwBoundIps, createAuthMethodLDAP.gwBoundIps) && @@ -400,7 +428,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, publicKeyData, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, boundIps, description, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, publicKeyData, token, uidToken, uniqueIdentifier); } @Override @@ -409,6 +437,7 @@ public String toString() { sb.append("class CreateAuthMethodLDAP {\n"); sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" genKey: ").append(toIndentedString(genKey)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodOAuth2.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodOAuth2.java index 3c1623c8..2228deb3 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodOAuth2.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodOAuth2.java @@ -48,6 +48,10 @@ public class CreateAuthMethodOAuth2 { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -211,6 +215,29 @@ public void setBoundIps(List boundIps) { } + public CreateAuthMethodOAuth2 description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodOAuth2 forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -539,6 +566,7 @@ public boolean equals(Object o) { Objects.equals(this.audience, createAuthMethodOAuth2.audience) && Objects.equals(this.boundClientIds, createAuthMethodOAuth2.boundClientIds) && Objects.equals(this.boundIps, createAuthMethodOAuth2.boundIps) && + Objects.equals(this.description, createAuthMethodOAuth2.description) && Objects.equals(this.forceSubClaims, createAuthMethodOAuth2.forceSubClaims) && Objects.equals(this.gatewayUrl, createAuthMethodOAuth2.gatewayUrl) && Objects.equals(this.gwBoundIps, createAuthMethodOAuth2.gwBoundIps) && @@ -556,7 +584,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundClientIds, boundIps, forceSubClaims, gatewayUrl, gwBoundIps, issuer, json, jwksJsonData, jwksUri, jwtTtl, name, subclaimsDelimiters, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, audience, boundClientIds, boundIps, description, forceSubClaims, gatewayUrl, gwBoundIps, issuer, json, jwksJsonData, jwksUri, jwtTtl, name, subclaimsDelimiters, token, uidToken, uniqueIdentifier); } @Override @@ -567,6 +595,7 @@ public String toString() { sb.append(" audience: ").append(toIndentedString(audience)).append("\n"); sb.append(" boundClientIds: ").append(toIndentedString(boundClientIds)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gatewayUrl: ").append(toIndentedString(gatewayUrl)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodOIDC.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodOIDC.java index 73c2d07f..53da097e 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodOIDC.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodOIDC.java @@ -56,6 +56,10 @@ public class CreateAuthMethodOIDC { @SerializedName(SERIALIZED_NAME_CLIENT_SECRET) private String clientSecret; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -261,6 +265,29 @@ public void setClientSecret(String clientSecret) { } + public CreateAuthMethodOIDC description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodOIDC forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -576,6 +603,7 @@ public boolean equals(Object o) { Objects.equals(this.boundIps, createAuthMethodOIDC.boundIps) && Objects.equals(this.clientId, createAuthMethodOIDC.clientId) && Objects.equals(this.clientSecret, createAuthMethodOIDC.clientSecret) && + Objects.equals(this.description, createAuthMethodOIDC.description) && Objects.equals(this.forceSubClaims, createAuthMethodOIDC.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodOIDC.gwBoundIps) && Objects.equals(this.issuer, createAuthMethodOIDC.issuer) && @@ -592,7 +620,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, allowedRedirectUri, audience, boundIps, clientId, clientSecret, forceSubClaims, gwBoundIps, issuer, json, jwtTtl, name, requiredScopes, requiredScopesPrefix, subclaimsDelimiters, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, allowedRedirectUri, audience, boundIps, clientId, clientSecret, description, forceSubClaims, gwBoundIps, issuer, json, jwtTtl, name, requiredScopes, requiredScopesPrefix, subclaimsDelimiters, token, uidToken, uniqueIdentifier); } @Override @@ -605,6 +633,7 @@ public String toString() { sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); sb.append(" clientId: ").append(toIndentedString(clientId)).append("\n"); sb.append(" clientSecret: ").append(toIndentedString(clientSecret)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" issuer: ").append(toIndentedString(issuer)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodSAML.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodSAML.java index adcf4e52..591bdec0 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodSAML.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodSAML.java @@ -44,6 +44,10 @@ public class CreateAuthMethodSAML { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -176,6 +180,29 @@ public void setBoundIps(List boundIps) { } + public CreateAuthMethodSAML description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodSAML forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -457,6 +484,7 @@ public boolean equals(Object o) { return Objects.equals(this.accessExpires, createAuthMethodSAML.accessExpires) && Objects.equals(this.allowedRedirectUri, createAuthMethodSAML.allowedRedirectUri) && Objects.equals(this.boundIps, createAuthMethodSAML.boundIps) && + Objects.equals(this.description, createAuthMethodSAML.description) && Objects.equals(this.forceSubClaims, createAuthMethodSAML.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodSAML.gwBoundIps) && Objects.equals(this.idpMetadataUrl, createAuthMethodSAML.idpMetadataUrl) && @@ -472,7 +500,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, allowedRedirectUri, boundIps, forceSubClaims, gwBoundIps, idpMetadataUrl, idpMetadataXmlData, json, jwtTtl, name, subclaimsDelimiters, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, allowedRedirectUri, boundIps, description, forceSubClaims, gwBoundIps, idpMetadataUrl, idpMetadataXmlData, json, jwtTtl, name, subclaimsDelimiters, token, uidToken, uniqueIdentifier); } @Override @@ -482,6 +510,7 @@ public String toString() { sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" allowedRedirectUri: ").append(toIndentedString(allowedRedirectUri)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" idpMetadataUrl: ").append(toIndentedString(idpMetadataUrl)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateAuthMethodUniversalIdentity.java b/src/main/java/io/akeyless/client/model/CreateAuthMethodUniversalIdentity.java index 3185933a..37e26775 100644 --- a/src/main/java/io/akeyless/client/model/CreateAuthMethodUniversalIdentity.java +++ b/src/main/java/io/akeyless/client/model/CreateAuthMethodUniversalIdentity.java @@ -48,6 +48,10 @@ public class CreateAuthMethodUniversalIdentity { @SerializedName(SERIALIZED_NAME_DENY_ROTATE) private Boolean denyRotate; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -183,6 +187,29 @@ public void setDenyRotate(Boolean denyRotate) { } + public CreateAuthMethodUniversalIdentity description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public CreateAuthMethodUniversalIdentity forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -388,6 +415,7 @@ public boolean equals(Object o) { Objects.equals(this.boundIps, createAuthMethodUniversalIdentity.boundIps) && Objects.equals(this.denyInheritance, createAuthMethodUniversalIdentity.denyInheritance) && Objects.equals(this.denyRotate, createAuthMethodUniversalIdentity.denyRotate) && + Objects.equals(this.description, createAuthMethodUniversalIdentity.description) && Objects.equals(this.forceSubClaims, createAuthMethodUniversalIdentity.forceSubClaims) && Objects.equals(this.gwBoundIps, createAuthMethodUniversalIdentity.gwBoundIps) && Objects.equals(this.json, createAuthMethodUniversalIdentity.json) && @@ -400,7 +428,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, denyInheritance, denyRotate, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, ttl, uidToken); + return Objects.hash(accessExpires, boundIps, denyInheritance, denyRotate, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, token, ttl, uidToken); } @Override @@ -411,6 +439,7 @@ public String toString() { sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); sb.append(" denyInheritance: ").append(toIndentedString(denyInheritance)).append("\n"); sb.append(" denyRotate: ").append(toIndentedString(denyRotate)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateEventForwarder.java b/src/main/java/io/akeyless/client/model/CreateEventForwarder.java index 58977d05..6cefd289 100644 --- a/src/main/java/io/akeyless/client/model/CreateEventForwarder.java +++ b/src/main/java/io/akeyless/client/model/CreateEventForwarder.java @@ -395,11 +395,11 @@ public CreateEventForwarder addEventTypesItem(String eventTypesItem) { } /** - * List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure] + * List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] * @return eventTypes **/ @javax.annotation.Nullable - @ApiModelProperty(value = "List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure]") + @ApiModelProperty(value = "List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated]") public List getEventTypes() { return eventTypes; diff --git a/src/main/java/io/akeyless/client/model/CreateLinkedTarget.java b/src/main/java/io/akeyless/client/model/CreateLinkedTarget.java index 18f1a953..b4c2e53c 100644 --- a/src/main/java/io/akeyless/client/model/CreateLinkedTarget.java +++ b/src/main/java/io/akeyless/client/model/CreateLinkedTarget.java @@ -53,6 +53,10 @@ public class CreateLinkedTarget { @SerializedName(SERIALIZED_NAME_TOKEN) private String token; + public static final String SERIALIZED_NAME_TYPE = "type"; + @SerializedName(SERIALIZED_NAME_TYPE) + private String type; + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; @@ -198,6 +202,29 @@ public void setToken(String token) { } + public CreateLinkedTarget type(String type) { + + this.type = type; + return this; + } + + /** + * Specifies the hosts type, relevant only when working without parent target + * @return type + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Specifies the hosts type, relevant only when working without parent target") + + public String getType() { + return type; + } + + + public void setType(String type) { + this.type = type; + } + + public CreateLinkedTarget uidToken(String uidToken) { this.uidToken = uidToken; @@ -236,12 +263,13 @@ public boolean equals(Object o) { Objects.equals(this.name, createLinkedTarget.name) && Objects.equals(this.parentTargetName, createLinkedTarget.parentTargetName) && Objects.equals(this.token, createLinkedTarget.token) && + Objects.equals(this.type, createLinkedTarget.type) && Objects.equals(this.uidToken, createLinkedTarget.uidToken); } @Override public int hashCode() { - return Objects.hash(description, hosts, json, name, parentTargetName, token, uidToken); + return Objects.hash(description, hosts, json, name, parentTargetName, token, type, uidToken); } @Override @@ -254,6 +282,7 @@ public String toString() { sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" parentTargetName: ").append(toIndentedString(parentTargetName)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" type: ").append(toIndentedString(type)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); sb.append("}"); return sb.toString(); diff --git a/src/main/java/io/akeyless/client/model/CreateRole.java b/src/main/java/io/akeyless/client/model/CreateRole.java index 8970bda1..bcc4440f 100644 --- a/src/main/java/io/akeyless/client/model/CreateRole.java +++ b/src/main/java/io/akeyless/client/model/CreateRole.java @@ -45,6 +45,14 @@ public class CreateRole { @SerializedName(SERIALIZED_NAME_DESCRIPTION) private String description; + public static final String SERIALIZED_NAME_EVENT_CENTER_ACCESS = "event-center-access"; + @SerializedName(SERIALIZED_NAME_EVENT_CENTER_ACCESS) + private String eventCenterAccess; + + public static final String SERIALIZED_NAME_EVENT_FORWARDERS_ACCESS = "event-forwarders-access"; + @SerializedName(SERIALIZED_NAME_EVENT_FORWARDERS_ACCESS) + private String eventForwardersAccess; + public static final String SERIALIZED_NAME_GW_ANALYTICS_ACCESS = "gw-analytics-access"; @SerializedName(SERIALIZED_NAME_GW_ANALYTICS_ACCESS) private String gwAnalyticsAccess; @@ -168,6 +176,52 @@ public void setDescription(String description) { } + public CreateRole eventCenterAccess(String eventCenterAccess) { + + this.eventCenterAccess = eventCenterAccess; + return this; + } + + /** + * Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported + * @return eventCenterAccess + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported") + + public String getEventCenterAccess() { + return eventCenterAccess; + } + + + public void setEventCenterAccess(String eventCenterAccess) { + this.eventCenterAccess = eventCenterAccess; + } + + + public CreateRole eventForwardersAccess(String eventForwardersAccess) { + + this.eventForwardersAccess = eventForwardersAccess; + return this; + } + + /** + * Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. + * @return eventForwardersAccess + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported.") + + public String getEventForwardersAccess() { + return eventForwardersAccess; + } + + + public void setEventForwardersAccess(String eventForwardersAccess) { + this.eventForwardersAccess = eventForwardersAccess; + } + + public CreateRole gwAnalyticsAccess(String gwAnalyticsAccess) { this.gwAnalyticsAccess = gwAnalyticsAccess; @@ -342,6 +396,8 @@ public boolean equals(Object o) { Objects.equals(this.auditAccess, createRole.auditAccess) && Objects.equals(this.comment, createRole.comment) && Objects.equals(this.description, createRole.description) && + Objects.equals(this.eventCenterAccess, createRole.eventCenterAccess) && + Objects.equals(this.eventForwardersAccess, createRole.eventForwardersAccess) && Objects.equals(this.gwAnalyticsAccess, createRole.gwAnalyticsAccess) && Objects.equals(this.json, createRole.json) && Objects.equals(this.name, createRole.name) && @@ -353,7 +409,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(analyticsAccess, auditAccess, comment, description, gwAnalyticsAccess, json, name, sraReportsAccess, token, uidToken, usageReportsAccess); + return Objects.hash(analyticsAccess, auditAccess, comment, description, eventCenterAccess, eventForwardersAccess, gwAnalyticsAccess, json, name, sraReportsAccess, token, uidToken, usageReportsAccess); } @Override @@ -364,6 +420,8 @@ public String toString() { sb.append(" auditAccess: ").append(toIndentedString(auditAccess)).append("\n"); sb.append(" comment: ").append(toIndentedString(comment)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); + sb.append(" eventCenterAccess: ").append(toIndentedString(eventCenterAccess)).append("\n"); + sb.append(" eventForwardersAccess: ").append(toIndentedString(eventForwardersAccess)).append("\n"); sb.append(" gwAnalyticsAccess: ").append(toIndentedString(gwAnalyticsAccess)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateRotatedSecret.java b/src/main/java/io/akeyless/client/model/CreateRotatedSecret.java index e8d86faa..1aa02c42 100644 --- a/src/main/java/io/akeyless/client/model/CreateRotatedSecret.java +++ b/src/main/java/io/akeyless/client/model/CreateRotatedSecret.java @@ -31,6 +31,10 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class CreateRotatedSecret { + public static final String SERIALIZED_NAME_PROVIDER_TYPE = "ProviderType"; + @SerializedName(SERIALIZED_NAME_PROVIDER_TYPE) + private String providerType; + public static final String SERIALIZED_NAME_API_ID = "api-id"; @SerializedName(SERIALIZED_NAME_API_ID) private String apiId; @@ -79,6 +83,10 @@ public class CreateRotatedSecret { @SerializedName(SERIALIZED_NAME_GCP_SERVICE_ACCOUNT_KEY_ID) private String gcpServiceAccountKeyId; + public static final String SERIALIZED_NAME_HOST_PROVIDER = "host-provider"; + @SerializedName(SERIALIZED_NAME_HOST_PROVIDER) + private String hostProvider = "explicit"; + public static final String SERIALIZED_NAME_JSON = "json"; @SerializedName(SERIALIZED_NAME_JSON) private Boolean json = false; @@ -199,6 +207,10 @@ public class CreateRotatedSecret { @SerializedName(SERIALIZED_NAME_TAGS) private List tags = null; + public static final String SERIALIZED_NAME_TARGET = "target"; + @SerializedName(SERIALIZED_NAME_TARGET) + private List target = null; + public static final String SERIALIZED_NAME_TARGET_NAME = "target-name"; @SerializedName(SERIALIZED_NAME_TARGET_NAME) private String targetName; @@ -222,6 +234,29 @@ public class CreateRotatedSecret { public CreateRotatedSecret() { } + public CreateRotatedSecret providerType(String providerType) { + + this.providerType = providerType; + return this; + } + + /** + * Get providerType + * @return providerType + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getProviderType() { + return providerType; + } + + + public void setProviderType(String providerType) { + this.providerType = providerType; + } + + public CreateRotatedSecret apiId(String apiId) { this.apiId = apiId; @@ -498,6 +533,29 @@ public void setGcpServiceAccountKeyId(String gcpServiceAccountKeyId) { } + public CreateRotatedSecret hostProvider(String hostProvider) { + + this.hostProvider = hostProvider; + return this; + } + + /** + * Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret + * @return hostProvider + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret") + + public String getHostProvider() { + return hostProvider; + } + + + public void setHostProvider(String hostProvider) { + this.hostProvider = hostProvider; + } + + public CreateRotatedSecret json(Boolean json) { this.json = json; @@ -666,11 +724,11 @@ public CreateRotatedSecret rotationHour(Integer rotationHour) { } /** - * The Hour of the rotation in UTC + * The Hour of the rotation in UTC. Default rotation-hour is 14:00 * @return rotationHour **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The Hour of the rotation in UTC") + @ApiModelProperty(value = "The Hour of the rotation in UTC. Default rotation-hour is 14:00") public Integer getRotationHour() { return rotationHour; @@ -1204,6 +1262,37 @@ public void setTags(List tags) { } + public CreateRotatedSecret target(List target) { + + this.target = target; + return this; + } + + public CreateRotatedSecret addTargetItem(String targetItem) { + if (this.target == null) { + this.target = new ArrayList(); + } + this.target.add(targetItem); + return this; + } + + /** + * A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify multiple targets use argument multiple times + * @return target + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify multiple targets use argument multiple times") + + public List getTarget() { + return target; + } + + + public void setTarget(List target) { + this.target = target; + } + + public CreateRotatedSecret targetName(String targetName) { this.targetName = targetName; @@ -1328,7 +1417,8 @@ public boolean equals(Object o) { return false; } CreateRotatedSecret createRotatedSecret = (CreateRotatedSecret) o; - return Objects.equals(this.apiId, createRotatedSecret.apiId) && + return Objects.equals(this.providerType, createRotatedSecret.providerType) && + Objects.equals(this.apiId, createRotatedSecret.apiId) && Objects.equals(this.apiKey, createRotatedSecret.apiKey) && Objects.equals(this.applicationId, createRotatedSecret.applicationId) && Objects.equals(this.authenticationCredentials, createRotatedSecret.authenticationCredentials) && @@ -1340,6 +1430,7 @@ public boolean equals(Object o) { Objects.equals(this.gcpKey, createRotatedSecret.gcpKey) && Objects.equals(this.gcpServiceAccountEmail, createRotatedSecret.gcpServiceAccountEmail) && Objects.equals(this.gcpServiceAccountKeyId, createRotatedSecret.gcpServiceAccountKeyId) && + Objects.equals(this.hostProvider, createRotatedSecret.hostProvider) && Objects.equals(this.json, createRotatedSecret.json) && Objects.equals(this.key, createRotatedSecret.key) && Objects.equals(this.metadata, createRotatedSecret.metadata) && @@ -1370,6 +1461,7 @@ public boolean equals(Object o) { Objects.equals(this.sshUsername, createRotatedSecret.sshUsername) && Objects.equals(this.storageAccountKeyName, createRotatedSecret.storageAccountKeyName) && Objects.equals(this.tags, createRotatedSecret.tags) && + Objects.equals(this.target, createRotatedSecret.target) && Objects.equals(this.targetName, createRotatedSecret.targetName) && Objects.equals(this.token, createRotatedSecret.token) && Objects.equals(this.uidToken, createRotatedSecret.uidToken) && @@ -1379,13 +1471,14 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(apiId, apiKey, applicationId, authenticationCredentials, autoRotate, awsRegion, customPayload, deleteProtection, description, gcpKey, gcpServiceAccountEmail, gcpServiceAccountKeyId, json, key, metadata, name, rotateAfterDisconnect, rotatedPassword, rotatedUsername, rotationHour, rotationInterval, rotatorCredsType, rotatorCustomCmd, rotatorType, samePassword, secureAccessAllowExternalUser, secureAccessAwsAccountId, secureAccessAwsNativeCli, secureAccessBastionIssuer, secureAccessDbName, secureAccessDbSchema, secureAccessEnable, secureAccessHost, secureAccessRdpDomain, secureAccessRdpUser, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, sshPassword, sshUsername, storageAccountKeyName, tags, targetName, token, uidToken, userAttribute, userDn); + return Objects.hash(providerType, apiId, apiKey, applicationId, authenticationCredentials, autoRotate, awsRegion, customPayload, deleteProtection, description, gcpKey, gcpServiceAccountEmail, gcpServiceAccountKeyId, hostProvider, json, key, metadata, name, rotateAfterDisconnect, rotatedPassword, rotatedUsername, rotationHour, rotationInterval, rotatorCredsType, rotatorCustomCmd, rotatorType, samePassword, secureAccessAllowExternalUser, secureAccessAwsAccountId, secureAccessAwsNativeCli, secureAccessBastionIssuer, secureAccessDbName, secureAccessDbSchema, secureAccessEnable, secureAccessHost, secureAccessRdpDomain, secureAccessRdpUser, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, sshPassword, sshUsername, storageAccountKeyName, tags, target, targetName, token, uidToken, userAttribute, userDn); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class CreateRotatedSecret {\n"); + sb.append(" providerType: ").append(toIndentedString(providerType)).append("\n"); sb.append(" apiId: ").append(toIndentedString(apiId)).append("\n"); sb.append(" apiKey: ").append(toIndentedString(apiKey)).append("\n"); sb.append(" applicationId: ").append(toIndentedString(applicationId)).append("\n"); @@ -1398,6 +1491,7 @@ public String toString() { sb.append(" gcpKey: ").append(toIndentedString(gcpKey)).append("\n"); sb.append(" gcpServiceAccountEmail: ").append(toIndentedString(gcpServiceAccountEmail)).append("\n"); sb.append(" gcpServiceAccountKeyId: ").append(toIndentedString(gcpServiceAccountKeyId)).append("\n"); + sb.append(" hostProvider: ").append(toIndentedString(hostProvider)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" key: ").append(toIndentedString(key)).append("\n"); sb.append(" metadata: ").append(toIndentedString(metadata)).append("\n"); @@ -1428,6 +1522,7 @@ public String toString() { sb.append(" sshUsername: ").append(toIndentedString(sshUsername)).append("\n"); sb.append(" storageAccountKeyName: ").append(toIndentedString(storageAccountKeyName)).append("\n"); sb.append(" tags: ").append(toIndentedString(tags)).append("\n"); + sb.append(" target: ").append(toIndentedString(target)).append("\n"); sb.append(" targetName: ").append(toIndentedString(targetName)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateSSHCertIssuer.java b/src/main/java/io/akeyless/client/model/CreateSSHCertIssuer.java index fd771223..df58f289 100644 --- a/src/main/java/io/akeyless/client/model/CreateSSHCertIssuer.java +++ b/src/main/java/io/akeyless/client/model/CreateSSHCertIssuer.java @@ -33,9 +33,9 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class CreateSSHCertIssuer { - public static final String SERIALIZED_NAME_SSH_CERT_ISSUER_HOST_PROVIDER = "SshCertIssuerHostProvider"; - @SerializedName(SERIALIZED_NAME_SSH_CERT_ISSUER_HOST_PROVIDER) - private String sshCertIssuerHostProvider; + public static final String SERIALIZED_NAME_PROVIDER_TYPE = "ProviderType"; + @SerializedName(SERIALIZED_NAME_PROVIDER_TYPE) + private String providerType; public static final String SERIALIZED_NAME_ALLOWED_USERS = "allowed-users"; @SerializedName(SERIALIZED_NAME_ALLOWED_USERS) @@ -124,26 +124,26 @@ public class CreateSSHCertIssuer { public CreateSSHCertIssuer() { } - public CreateSSHCertIssuer sshCertIssuerHostProvider(String sshCertIssuerHostProvider) { + public CreateSSHCertIssuer providerType(String providerType) { - this.sshCertIssuerHostProvider = sshCertIssuerHostProvider; + this.providerType = providerType; return this; } /** - * Get sshCertIssuerHostProvider - * @return sshCertIssuerHostProvider + * Get providerType + * @return providerType **/ @javax.annotation.Nullable @ApiModelProperty(value = "") - public String getSshCertIssuerHostProvider() { - return sshCertIssuerHostProvider; + public String getProviderType() { + return providerType; } - public void setSshCertIssuerHostProvider(String sshCertIssuerHostProvider) { - this.sshCertIssuerHostProvider = sshCertIssuerHostProvider; + public void setProviderType(String providerType) { + this.providerType = providerType; } @@ -254,11 +254,11 @@ public CreateSSHCertIssuer hostProvider(String hostProvider) { } /** - * Host provider type [explicit/target] + * Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret * @return hostProvider **/ @javax.annotation.Nullable - @ApiModelProperty(value = "Host provider type [explicit/target]") + @ApiModelProperty(value = "Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret") public String getHostProvider() { return hostProvider; @@ -577,11 +577,11 @@ public CreateSSHCertIssuer addTargetItem(String targetItem) { } /** - * A list of existing targets to be associated, Relevant only for Secure Remote Access, To specify multiple targets use argument multiple times + * A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify multiple targets use argument multiple times * @return target **/ @javax.annotation.Nullable - @ApiModelProperty(value = "A list of existing targets to be associated, Relevant only for Secure Remote Access, To specify multiple targets use argument multiple times") + @ApiModelProperty(value = "A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer and ldap rotated secret, To specify multiple targets use argument multiple times") public List getTarget() { return target; @@ -671,7 +671,7 @@ public boolean equals(Object o) { return false; } CreateSSHCertIssuer createSSHCertIssuer = (CreateSSHCertIssuer) o; - return Objects.equals(this.sshCertIssuerHostProvider, createSSHCertIssuer.sshCertIssuerHostProvider) && + return Objects.equals(this.providerType, createSSHCertIssuer.providerType) && Objects.equals(this.allowedUsers, createSSHCertIssuer.allowedUsers) && Objects.equals(this.deleteProtection, createSSHCertIssuer.deleteProtection) && Objects.equals(this.description, createSSHCertIssuer.description) && @@ -697,14 +697,14 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(sshCertIssuerHostProvider, allowedUsers, deleteProtection, description, extensions, hostProvider, json, metadata, name, principals, secureAccessBastionApi, secureAccessBastionSsh, secureAccessEnable, secureAccessHost, secureAccessSshCredsUser, secureAccessUseInternalBastion, signerKeyName, tag, target, token, ttl, uidToken); + return Objects.hash(providerType, allowedUsers, deleteProtection, description, extensions, hostProvider, json, metadata, name, principals, secureAccessBastionApi, secureAccessBastionSsh, secureAccessEnable, secureAccessHost, secureAccessSshCredsUser, secureAccessUseInternalBastion, signerKeyName, tag, target, token, ttl, uidToken); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class CreateSSHCertIssuer {\n"); - sb.append(" sshCertIssuerHostProvider: ").append(toIndentedString(sshCertIssuerHostProvider)).append("\n"); + sb.append(" providerType: ").append(toIndentedString(providerType)).append("\n"); sb.append(" allowedUsers: ").append(toIndentedString(allowedUsers)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateSecret.java b/src/main/java/io/akeyless/client/model/CreateSecret.java index a29aff58..b53e797b 100644 --- a/src/main/java/io/akeyless/client/model/CreateSecret.java +++ b/src/main/java/io/akeyless/client/model/CreateSecret.java @@ -37,6 +37,10 @@ public class CreateSecret { @SerializedName(SERIALIZED_NAME_ACCESSIBILITY) private String accessibility = "regular"; + public static final String SERIALIZED_NAME_CHANGE_EVENT = "change-event"; + @SerializedName(SERIALIZED_NAME_CHANGE_EVENT) + private String changeEvent; + public static final String SERIALIZED_NAME_CUSTOM_FIELD = "custom-field"; @SerializedName(SERIALIZED_NAME_CUSTOM_FIELD) private Map customField = null; @@ -163,6 +167,29 @@ public void setAccessibility(String accessibility) { } + public CreateSecret changeEvent(String changeEvent) { + + this.changeEvent = changeEvent; + return this; + } + + /** + * Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) + * @return changeEvent + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret)") + + public String getChangeEvent() { + return changeEvent; + } + + + public void setChangeEvent(String changeEvent) { + this.changeEvent = changeEvent; + } + + public CreateSecret customField(Map customField) { this.customField = customField; @@ -780,6 +807,7 @@ public boolean equals(Object o) { } CreateSecret createSecret = (CreateSecret) o; return Objects.equals(this.accessibility, createSecret.accessibility) && + Objects.equals(this.changeEvent, createSecret.changeEvent) && Objects.equals(this.customField, createSecret.customField) && Objects.equals(this.deleteProtection, createSecret.deleteProtection) && Objects.equals(this.description, createSecret.description) && @@ -809,7 +837,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessibility, customField, deleteProtection, description, injectUrl, json, metadata, multilineValue, name, password, protectionKey, secureAccessBastionIssuer, secureAccessEnable, secureAccessHost, secureAccessRdpUser, secureAccessSshCreds, secureAccessSshUser, secureAccessUrl, secureAccessWebBrowsing, secureAccessWebProxy, tags, token, type, uidToken, username, value); + return Objects.hash(accessibility, changeEvent, customField, deleteProtection, description, injectUrl, json, metadata, multilineValue, name, password, protectionKey, secureAccessBastionIssuer, secureAccessEnable, secureAccessHost, secureAccessRdpUser, secureAccessSshCreds, secureAccessSshUser, secureAccessUrl, secureAccessWebBrowsing, secureAccessWebProxy, tags, token, type, uidToken, username, value); } @Override @@ -817,6 +845,7 @@ public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class CreateSecret {\n"); sb.append(" accessibility: ").append(toIndentedString(accessibility)).append("\n"); + sb.append(" changeEvent: ").append(toIndentedString(changeEvent)).append("\n"); sb.append(" customField: ").append(toIndentedString(customField)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayCreateMigration.java b/src/main/java/io/akeyless/client/model/GatewayCreateMigration.java index 6fb1e4a4..8c7ee22e 100644 --- a/src/main/java/io/akeyless/client/model/GatewayCreateMigration.java +++ b/src/main/java/io/akeyless/client/model/GatewayCreateMigration.java @@ -252,6 +252,10 @@ public class GatewayCreateMigration { @SerializedName(SERIALIZED_NAME_SI_TARGET_NAME) private String siTargetName; + public static final String SERIALIZED_NAME_SI_USER_GROUPS = "si-user-groups"; + @SerializedName(SERIALIZED_NAME_SI_USER_GROUPS) + private String siUserGroups; + public static final String SERIALIZED_NAME_SI_USERS_IGNORE = "si-users-ignore"; @SerializedName(SERIALIZED_NAME_SI_USERS_IGNORE) private String siUsersIgnore; @@ -1592,6 +1596,29 @@ public void setSiTargetName(String siTargetName) { } + public GatewayCreateMigration siUserGroups(String siUserGroups) { + + this.siUserGroups = siUserGroups; + return this; + } + + /** + * Comma-separated list of groups to migrate users from. If empty, all users from all groups will be migrated (Relevant only for Server Inventory migration) + * @return siUserGroups + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Comma-separated list of groups to migrate users from. If empty, all users from all groups will be migrated (Relevant only for Server Inventory migration)") + + public String getSiUserGroups() { + return siUserGroups; + } + + + public void setSiUserGroups(String siUserGroups) { + this.siUserGroups = siUserGroups; + } + + public GatewayCreateMigration siUsersIgnore(String siUsersIgnore) { this.siUsersIgnore = siUsersIgnore; @@ -1794,6 +1821,7 @@ public boolean equals(Object o) { Objects.equals(this.siRotationInterval, gatewayCreateMigration.siRotationInterval) && Objects.equals(this.siSraEnableRdp, gatewayCreateMigration.siSraEnableRdp) && Objects.equals(this.siTargetName, gatewayCreateMigration.siTargetName) && + Objects.equals(this.siUserGroups, gatewayCreateMigration.siUserGroups) && Objects.equals(this.siUsersIgnore, gatewayCreateMigration.siUsersIgnore) && Objects.equals(this.siUsersPathTemplate, gatewayCreateMigration.siUsersPathTemplate) && Objects.equals(this.targetLocation, gatewayCreateMigration.targetLocation) && @@ -1804,7 +1832,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(_1passwordEmail, _1passwordPassword, _1passwordSecretKey, _1passwordUrl, _1passwordVaults, adDiscoverServices, adDiscoveryTypes, adOsFilter, adSshPort, adTargetsType, adWinrmOverHttp, adWinrmPort, adAutoRotate, adComputerBaseDn, adDiscoverLocalUsers, adDomainName, adDomainUsersPathTemplate, adLocalUsersIgnore, adLocalUsersPathTemplate, adRotationHour, adRotationInterval, adSraEnableRdp, adTargetName, adTargetsPathTemplate, adUserBaseDn, adUserGroups, awsKey, awsKeyId, awsRegion, azureClientId, azureKvName, azureSecret, azureTenantId, gcpKey, hashiJson, hashiNs, hashiToken, hashiUrl, json, k8sCaCertificate, k8sClientCertificate, k8sClientKey, k8sNamespace, k8sPassword, k8sSkipSystem, k8sToken, k8sUrl, k8sUsername, name, protectionKey, siAutoRotate, siRotationHour, siRotationInterval, siSraEnableRdp, siTargetName, siUsersIgnore, siUsersPathTemplate, targetLocation, token, type, uidToken); + return Objects.hash(_1passwordEmail, _1passwordPassword, _1passwordSecretKey, _1passwordUrl, _1passwordVaults, adDiscoverServices, adDiscoveryTypes, adOsFilter, adSshPort, adTargetsType, adWinrmOverHttp, adWinrmPort, adAutoRotate, adComputerBaseDn, adDiscoverLocalUsers, adDomainName, adDomainUsersPathTemplate, adLocalUsersIgnore, adLocalUsersPathTemplate, adRotationHour, adRotationInterval, adSraEnableRdp, adTargetName, adTargetsPathTemplate, adUserBaseDn, adUserGroups, awsKey, awsKeyId, awsRegion, azureClientId, azureKvName, azureSecret, azureTenantId, gcpKey, hashiJson, hashiNs, hashiToken, hashiUrl, json, k8sCaCertificate, k8sClientCertificate, k8sClientKey, k8sNamespace, k8sPassword, k8sSkipSystem, k8sToken, k8sUrl, k8sUsername, name, protectionKey, siAutoRotate, siRotationHour, siRotationInterval, siSraEnableRdp, siTargetName, siUserGroups, siUsersIgnore, siUsersPathTemplate, targetLocation, token, type, uidToken); } @Override @@ -1866,6 +1894,7 @@ public String toString() { sb.append(" siRotationInterval: ").append(toIndentedString(siRotationInterval)).append("\n"); sb.append(" siSraEnableRdp: ").append(toIndentedString(siSraEnableRdp)).append("\n"); sb.append(" siTargetName: ").append(toIndentedString(siTargetName)).append("\n"); + sb.append(" siUserGroups: ").append(toIndentedString(siUserGroups)).append("\n"); sb.append(" siUsersIgnore: ").append(toIndentedString(siUsersIgnore)).append("\n"); sb.append(" siUsersPathTemplate: ").append(toIndentedString(siUsersPathTemplate)).append("\n"); sb.append(" targetLocation: ").append(toIndentedString(targetLocation)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayCreateProducerCassandra.java b/src/main/java/io/akeyless/client/model/GatewayCreateProducerCassandra.java index 95e0de85..f2ec0b4d 100644 --- a/src/main/java/io/akeyless/client/model/GatewayCreateProducerCassandra.java +++ b/src/main/java/io/akeyless/client/model/GatewayCreateProducerCassandra.java @@ -68,6 +68,14 @@ public class GatewayCreateProducerCassandra { @SerializedName(SERIALIZED_NAME_PRODUCER_ENCRYPTION_KEY_NAME) private String producerEncryptionKeyName; + public static final String SERIALIZED_NAME_SSL = "ssl"; + @SerializedName(SERIALIZED_NAME_SSL) + private Boolean ssl = false; + + public static final String SERIALIZED_NAME_SSL_CERTIFICATE = "ssl-certificate"; + @SerializedName(SERIALIZED_NAME_SSL_CERTIFICATE) + private String sslCertificate; + public static final String SERIALIZED_NAME_TAGS = "tags"; @SerializedName(SERIALIZED_NAME_TAGS) private List tags = null; @@ -298,6 +306,52 @@ public void setProducerEncryptionKeyName(String producerEncryptionKeyName) { } + public GatewayCreateProducerCassandra ssl(Boolean ssl) { + + this.ssl = ssl; + return this; + } + + /** + * Enable/Disable SSL [true/false] + * @return ssl + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Enable/Disable SSL [true/false]") + + public Boolean getSsl() { + return ssl; + } + + + public void setSsl(Boolean ssl) { + this.ssl = ssl; + } + + + public GatewayCreateProducerCassandra sslCertificate(String sslCertificate) { + + this.sslCertificate = sslCertificate; + return this; + } + + /** + * SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA) + * @return sslCertificate + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)") + + public String getSslCertificate() { + return sslCertificate; + } + + + public void setSslCertificate(String sslCertificate) { + this.sslCertificate = sslCertificate; + } + + public GatewayCreateProducerCassandra tags(List tags) { this.tags = tags; @@ -439,6 +493,8 @@ public boolean equals(Object o) { Objects.equals(this.json, gatewayCreateProducerCassandra.json) && Objects.equals(this.name, gatewayCreateProducerCassandra.name) && Objects.equals(this.producerEncryptionKeyName, gatewayCreateProducerCassandra.producerEncryptionKeyName) && + Objects.equals(this.ssl, gatewayCreateProducerCassandra.ssl) && + Objects.equals(this.sslCertificate, gatewayCreateProducerCassandra.sslCertificate) && Objects.equals(this.tags, gatewayCreateProducerCassandra.tags) && Objects.equals(this.targetName, gatewayCreateProducerCassandra.targetName) && Objects.equals(this.token, gatewayCreateProducerCassandra.token) && @@ -448,7 +504,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(cassandraCreationStatements, cassandraHosts, cassandraPassword, cassandraPort, cassandraUsername, deleteProtection, json, name, producerEncryptionKeyName, tags, targetName, token, uidToken, userTtl); + return Objects.hash(cassandraCreationStatements, cassandraHosts, cassandraPassword, cassandraPort, cassandraUsername, deleteProtection, json, name, producerEncryptionKeyName, ssl, sslCertificate, tags, targetName, token, uidToken, userTtl); } @Override @@ -464,6 +520,8 @@ public String toString() { sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" producerEncryptionKeyName: ").append(toIndentedString(producerEncryptionKeyName)).append("\n"); + sb.append(" ssl: ").append(toIndentedString(ssl)).append("\n"); + sb.append(" sslCertificate: ").append(toIndentedString(sslCertificate)).append("\n"); sb.append(" tags: ").append(toIndentedString(tags)).append("\n"); sb.append(" targetName: ").append(toIndentedString(targetName)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayUpdateItem.java b/src/main/java/io/akeyless/client/model/GatewayUpdateItem.java index 9e6cce1c..0cda85c4 100644 --- a/src/main/java/io/akeyless/client/model/GatewayUpdateItem.java +++ b/src/main/java/io/akeyless/client/model/GatewayUpdateItem.java @@ -44,6 +44,10 @@ public class GatewayUpdateItem { @SerializedName(SERIALIZED_NAME_API_KEY) private String apiKey; + public static final String SERIALIZED_NAME_APP_ID = "app-id"; + @SerializedName(SERIALIZED_NAME_APP_ID) + private String appId; + public static final String SERIALIZED_NAME_AUTO_ROTATE = "auto-rotate"; @SerializedName(SERIALIZED_NAME_AUTO_ROTATE) private String autoRotate; @@ -216,6 +220,29 @@ public void setApiKey(String apiKey) { } + public GatewayUpdateItem appId(String appId) { + + this.appId = appId; + return this; + } + + /** + * ApplicationId (used in azure) + * @return appId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "ApplicationId (used in azure)") + + public String getAppId() { + return appId; + } + + + public void setAppId(String appId) { + this.appId = appId; + } + + public GatewayUpdateItem autoRotate(String autoRotate) { this.autoRotate = autoRotate; @@ -765,6 +792,7 @@ public boolean equals(Object o) { return Objects.equals(this.addTag, gatewayUpdateItem.addTag) && Objects.equals(this.apiId, gatewayUpdateItem.apiId) && Objects.equals(this.apiKey, gatewayUpdateItem.apiKey) && + Objects.equals(this.appId, gatewayUpdateItem.appId) && Objects.equals(this.autoRotate, gatewayUpdateItem.autoRotate) && Objects.equals(this.customPayload, gatewayUpdateItem.customPayload) && Objects.equals(this.deleteProtection, gatewayUpdateItem.deleteProtection) && @@ -792,7 +820,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(addTag, apiId, apiKey, autoRotate, customPayload, deleteProtection, description, gcpKey, gcpServiceAccountEmail, gcpServiceAccountKeyId, json, keepPrevVersion, key, name, newMetadata, newName, newVersion, rmTag, rotatedPassword, rotatedUsername, rotationHour, rotationInterval, rotatorCredsType, token, type, uidToken); + return Objects.hash(addTag, apiId, apiKey, appId, autoRotate, customPayload, deleteProtection, description, gcpKey, gcpServiceAccountEmail, gcpServiceAccountKeyId, json, keepPrevVersion, key, name, newMetadata, newName, newVersion, rmTag, rotatedPassword, rotatedUsername, rotationHour, rotationInterval, rotatorCredsType, token, type, uidToken); } @Override @@ -802,6 +830,7 @@ public String toString() { sb.append(" addTag: ").append(toIndentedString(addTag)).append("\n"); sb.append(" apiId: ").append(toIndentedString(apiId)).append("\n"); sb.append(" apiKey: ").append(toIndentedString(apiKey)).append("\n"); + sb.append(" appId: ").append(toIndentedString(appId)).append("\n"); sb.append(" autoRotate: ").append(toIndentedString(autoRotate)).append("\n"); sb.append(" customPayload: ").append(toIndentedString(customPayload)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayUpdateMigration.java b/src/main/java/io/akeyless/client/model/GatewayUpdateMigration.java index eb933134..6f4e8479 100644 --- a/src/main/java/io/akeyless/client/model/GatewayUpdateMigration.java +++ b/src/main/java/io/akeyless/client/model/GatewayUpdateMigration.java @@ -260,6 +260,10 @@ public class GatewayUpdateMigration { @SerializedName(SERIALIZED_NAME_SI_TARGET_NAME) private String siTargetName; + public static final String SERIALIZED_NAME_SI_USER_GROUPS = "si-user-groups"; + @SerializedName(SERIALIZED_NAME_SI_USER_GROUPS) + private String siUserGroups; + public static final String SERIALIZED_NAME_SI_USERS_IGNORE = "si-users-ignore"; @SerializedName(SERIALIZED_NAME_SI_USERS_IGNORE) private String siUsersIgnore; @@ -1642,6 +1646,29 @@ public void setSiTargetName(String siTargetName) { } + public GatewayUpdateMigration siUserGroups(String siUserGroups) { + + this.siUserGroups = siUserGroups; + return this; + } + + /** + * Comma-separated list of groups to migrate users from. If empty, all users from all groups will be migrated (Relevant only for Server Inventory migration) + * @return siUserGroups + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Comma-separated list of groups to migrate users from. If empty, all users from all groups will be migrated (Relevant only for Server Inventory migration)") + + public String getSiUserGroups() { + return siUserGroups; + } + + + public void setSiUserGroups(String siUserGroups) { + this.siUserGroups = siUserGroups; + } + + public GatewayUpdateMigration siUsersIgnore(String siUsersIgnore) { this.siUsersIgnore = siUsersIgnore; @@ -1823,6 +1850,7 @@ public boolean equals(Object o) { Objects.equals(this.siRotationInterval, gatewayUpdateMigration.siRotationInterval) && Objects.equals(this.siSraEnableRdp, gatewayUpdateMigration.siSraEnableRdp) && Objects.equals(this.siTargetName, gatewayUpdateMigration.siTargetName) && + Objects.equals(this.siUserGroups, gatewayUpdateMigration.siUserGroups) && Objects.equals(this.siUsersIgnore, gatewayUpdateMigration.siUsersIgnore) && Objects.equals(this.siUsersPathTemplate, gatewayUpdateMigration.siUsersPathTemplate) && Objects.equals(this.targetLocation, gatewayUpdateMigration.targetLocation) && @@ -1832,7 +1860,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(_1passwordEmail, _1passwordPassword, _1passwordSecretKey, _1passwordUrl, _1passwordVaults, adDiscoverServices, adDiscoveryTypes, adOsFilter, adSshPort, adTargetsType, adWinrmOverHttp, adWinrmPort, adAutoRotate, adComputerBaseDn, adDiscoverLocalUsers, adDomainName, adDomainUsersPathTemplate, adLocalUsersIgnore, adLocalUsersPathTemplate, adRotationHour, adRotationInterval, adSraEnableRdp, adTargetName, adTargetsPathTemplate, adUserBaseDn, adUserGroups, awsKey, awsKeyId, awsRegion, azureClientId, azureKvName, azureSecret, azureTenantId, gcpKey, hashiJson, hashiNs, hashiToken, hashiUrl, id, json, k8sCaCertificate, k8sClientCertificate, k8sClientKey, k8sNamespace, k8sPassword, k8sSkipSystem, k8sToken, k8sUrl, k8sUsername, name, newName, protectionKey, siAutoRotate, siRotationHour, siRotationInterval, siSraEnableRdp, siTargetName, siUsersIgnore, siUsersPathTemplate, targetLocation, token, uidToken); + return Objects.hash(_1passwordEmail, _1passwordPassword, _1passwordSecretKey, _1passwordUrl, _1passwordVaults, adDiscoverServices, adDiscoveryTypes, adOsFilter, adSshPort, adTargetsType, adWinrmOverHttp, adWinrmPort, adAutoRotate, adComputerBaseDn, adDiscoverLocalUsers, adDomainName, adDomainUsersPathTemplate, adLocalUsersIgnore, adLocalUsersPathTemplate, adRotationHour, adRotationInterval, adSraEnableRdp, adTargetName, adTargetsPathTemplate, adUserBaseDn, adUserGroups, awsKey, awsKeyId, awsRegion, azureClientId, azureKvName, azureSecret, azureTenantId, gcpKey, hashiJson, hashiNs, hashiToken, hashiUrl, id, json, k8sCaCertificate, k8sClientCertificate, k8sClientKey, k8sNamespace, k8sPassword, k8sSkipSystem, k8sToken, k8sUrl, k8sUsername, name, newName, protectionKey, siAutoRotate, siRotationHour, siRotationInterval, siSraEnableRdp, siTargetName, siUserGroups, siUsersIgnore, siUsersPathTemplate, targetLocation, token, uidToken); } @Override @@ -1896,6 +1924,7 @@ public String toString() { sb.append(" siRotationInterval: ").append(toIndentedString(siRotationInterval)).append("\n"); sb.append(" siSraEnableRdp: ").append(toIndentedString(siSraEnableRdp)).append("\n"); sb.append(" siTargetName: ").append(toIndentedString(siTargetName)).append("\n"); + sb.append(" siUserGroups: ").append(toIndentedString(siUserGroups)).append("\n"); sb.append(" siUsersIgnore: ").append(toIndentedString(siUsersIgnore)).append("\n"); sb.append(" siUsersPathTemplate: ").append(toIndentedString(siUsersPathTemplate)).append("\n"); sb.append(" targetLocation: ").append(toIndentedString(targetLocation)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayUpdateProducerCassandra.java b/src/main/java/io/akeyless/client/model/GatewayUpdateProducerCassandra.java index 536290f6..5b66ec02 100644 --- a/src/main/java/io/akeyless/client/model/GatewayUpdateProducerCassandra.java +++ b/src/main/java/io/akeyless/client/model/GatewayUpdateProducerCassandra.java @@ -72,6 +72,14 @@ public class GatewayUpdateProducerCassandra { @SerializedName(SERIALIZED_NAME_PRODUCER_ENCRYPTION_KEY_NAME) private String producerEncryptionKeyName; + public static final String SERIALIZED_NAME_SSL = "ssl"; + @SerializedName(SERIALIZED_NAME_SSL) + private Boolean ssl = false; + + public static final String SERIALIZED_NAME_SSL_CERTIFICATE = "ssl-certificate"; + @SerializedName(SERIALIZED_NAME_SSL_CERTIFICATE) + private String sslCertificate; + public static final String SERIALIZED_NAME_TAGS = "tags"; @SerializedName(SERIALIZED_NAME_TAGS) private List tags = null; @@ -325,6 +333,52 @@ public void setProducerEncryptionKeyName(String producerEncryptionKeyName) { } + public GatewayUpdateProducerCassandra ssl(Boolean ssl) { + + this.ssl = ssl; + return this; + } + + /** + * Enable/Disable SSL [true/false] + * @return ssl + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Enable/Disable SSL [true/false]") + + public Boolean getSsl() { + return ssl; + } + + + public void setSsl(Boolean ssl) { + this.ssl = ssl; + } + + + public GatewayUpdateProducerCassandra sslCertificate(String sslCertificate) { + + this.sslCertificate = sslCertificate; + return this; + } + + /** + * SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA) + * @return sslCertificate + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "SSL CA certificate in base64 encoding generated from a trusted Certificate Authority (CA)") + + public String getSslCertificate() { + return sslCertificate; + } + + + public void setSslCertificate(String sslCertificate) { + this.sslCertificate = sslCertificate; + } + + public GatewayUpdateProducerCassandra tags(List tags) { this.tags = tags; @@ -467,6 +521,8 @@ public boolean equals(Object o) { Objects.equals(this.name, gatewayUpdateProducerCassandra.name) && Objects.equals(this.newName, gatewayUpdateProducerCassandra.newName) && Objects.equals(this.producerEncryptionKeyName, gatewayUpdateProducerCassandra.producerEncryptionKeyName) && + Objects.equals(this.ssl, gatewayUpdateProducerCassandra.ssl) && + Objects.equals(this.sslCertificate, gatewayUpdateProducerCassandra.sslCertificate) && Objects.equals(this.tags, gatewayUpdateProducerCassandra.tags) && Objects.equals(this.targetName, gatewayUpdateProducerCassandra.targetName) && Objects.equals(this.token, gatewayUpdateProducerCassandra.token) && @@ -476,7 +532,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(cassandraCreationStatements, cassandraHosts, cassandraPassword, cassandraPort, cassandraUsername, deleteProtection, json, name, newName, producerEncryptionKeyName, tags, targetName, token, uidToken, userTtl); + return Objects.hash(cassandraCreationStatements, cassandraHosts, cassandraPassword, cassandraPort, cassandraUsername, deleteProtection, json, name, newName, producerEncryptionKeyName, ssl, sslCertificate, tags, targetName, token, uidToken, userTtl); } @Override @@ -493,6 +549,8 @@ public String toString() { sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" newName: ").append(toIndentedString(newName)).append("\n"); sb.append(" producerEncryptionKeyName: ").append(toIndentedString(producerEncryptionKeyName)).append("\n"); + sb.append(" ssl: ").append(toIndentedString(ssl)).append("\n"); + sb.append(" sslCertificate: ").append(toIndentedString(sslCertificate)).append("\n"); sb.append(" tags: ").append(toIndentedString(tags)).append("\n"); sb.append(" targetName: ").append(toIndentedString(targetName)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GenerateCsr.java b/src/main/java/io/akeyless/client/model/GenerateCsr.java index 21ca4ba5..f86d681d 100644 --- a/src/main/java/io/akeyless/client/model/GenerateCsr.java +++ b/src/main/java/io/akeyless/client/model/GenerateCsr.java @@ -418,11 +418,11 @@ public GenerateCsr name(String name) { } /** - * The classic key name + * The key name * @return name **/ @javax.annotation.Nonnull - @ApiModelProperty(required = true, value = "The classic key name") + @ApiModelProperty(required = true, value = "The key name") public String getName() { return name; diff --git a/src/main/java/io/akeyless/client/model/GwClusterIdentity.java b/src/main/java/io/akeyless/client/model/GwClusterIdentity.java index 95715a84..f949049c 100644 --- a/src/main/java/io/akeyless/client/model/GwClusterIdentity.java +++ b/src/main/java/io/akeyless/client/model/GwClusterIdentity.java @@ -80,6 +80,10 @@ public class GwClusterIdentity { @SerializedName(SERIALIZED_NAME_ID) private Long id; + public static final String SERIALIZED_NAME_SERVERLESS_TYPE = "serverless_type"; + @SerializedName(SERIALIZED_NAME_SERVERLESS_TYPE) + private String serverlessType; + public static final String SERIALIZED_NAME_STATUS = "status"; @SerializedName(SERIALIZED_NAME_STATUS) private String status; @@ -391,6 +395,29 @@ public void setId(Long id) { } + public GwClusterIdentity serverlessType(String serverlessType) { + + this.serverlessType = serverlessType; + return this; + } + + /** + * Get serverlessType + * @return serverlessType + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getServerlessType() { + return serverlessType; + } + + + public void setServerlessType(String serverlessType) { + this.serverlessType = serverlessType; + } + + public GwClusterIdentity status(String status) { this.status = status; @@ -458,13 +485,14 @@ public boolean equals(Object o) { Objects.equals(this.defaultSecretLocation, gwClusterIdentity.defaultSecretLocation) && Objects.equals(this.displayName, gwClusterIdentity.displayName) && Objects.equals(this.id, gwClusterIdentity.id) && + Objects.equals(this.serverlessType, gwClusterIdentity.serverlessType) && Objects.equals(this.status, gwClusterIdentity.status) && Objects.equals(this.statusDescription, gwClusterIdentity.statusDescription); } @Override public int hashCode() { - return Objects.hash(actionAllowed, allowed, allowedAccessIds, clusterName, clusterUrl, currentGw, customerFragmentIds, customerFragments, defaultProtectionKeyId, defaultSecretLocation, displayName, id, status, statusDescription); + return Objects.hash(actionAllowed, allowed, allowedAccessIds, clusterName, clusterUrl, currentGw, customerFragmentIds, customerFragments, defaultProtectionKeyId, defaultSecretLocation, displayName, id, serverlessType, status, statusDescription); } @Override @@ -483,6 +511,7 @@ public String toString() { sb.append(" defaultSecretLocation: ").append(toIndentedString(defaultSecretLocation)).append("\n"); sb.append(" displayName: ").append(toIndentedString(displayName)).append("\n"); sb.append(" id: ").append(toIndentedString(id)).append("\n"); + sb.append(" serverlessType: ").append(toIndentedString(serverlessType)).append("\n"); sb.append(" status: ").append(toIndentedString(status)).append("\n"); sb.append(" statusDescription: ").append(toIndentedString(statusDescription)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/ImportPasswords.java b/src/main/java/io/akeyless/client/model/ImportPasswords.java index ca42d3de..74d1d6d9 100644 --- a/src/main/java/io/akeyless/client/model/ImportPasswords.java +++ b/src/main/java/io/akeyless/client/model/ImportPasswords.java @@ -62,6 +62,10 @@ public class ImportPasswords { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_UPDATE_MODE = "update-mode"; + @SerializedName(SERIALIZED_NAME_UPDATE_MODE) + private String updateMode; + public ImportPasswords() { } @@ -249,6 +253,29 @@ public void setUidToken(String uidToken) { } + public ImportPasswords updateMode(String updateMode) { + + this.updateMode = updateMode; + return this; + } + + /** + * Get updateMode + * @return updateMode + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getUpdateMode() { + return updateMode; + } + + + public void setUpdateMode(String updateMode) { + this.updateMode = updateMode; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -265,12 +292,13 @@ public boolean equals(Object o) { Objects.equals(this.protectionKey, importPasswords.protectionKey) && Objects.equals(this.targetFolder, importPasswords.targetFolder) && Objects.equals(this.token, importPasswords.token) && - Objects.equals(this.uidToken, importPasswords.uidToken); + Objects.equals(this.uidToken, importPasswords.uidToken) && + Objects.equals(this.updateMode, importPasswords.updateMode); } @Override public int hashCode() { - return Objects.hash(accessibility, format, importPath, json, protectionKey, targetFolder, token, uidToken); + return Objects.hash(accessibility, format, importPath, json, protectionKey, targetFolder, token, uidToken, updateMode); } @Override @@ -285,6 +313,7 @@ public String toString() { sb.append(" targetFolder: ").append(toIndentedString(targetFolder)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" updateMode: ").append(toIndentedString(updateMode)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/ImportPasswordsOutput.java b/src/main/java/io/akeyless/client/model/ImportPasswordsOutput.java index db95bcf5..2256c5d0 100644 --- a/src/main/java/io/akeyless/client/model/ImportPasswordsOutput.java +++ b/src/main/java/io/akeyless/client/model/ImportPasswordsOutput.java @@ -41,6 +41,10 @@ public class ImportPasswordsOutput { @SerializedName(SERIALIZED_NAME_SUCCESSFULLY_PARSED) private Long successfullyParsed; + public static final String SERIALIZED_NAME_UPDATED = "updated"; + @SerializedName(SERIALIZED_NAME_UPDATED) + private Integer updated; + public ImportPasswordsOutput() { } @@ -113,6 +117,29 @@ public void setSuccessfullyParsed(Long successfullyParsed) { } + public ImportPasswordsOutput updated(Integer updated) { + + this.updated = updated; + return this; + } + + /** + * Get updated + * @return updated + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Integer getUpdated() { + return updated; + } + + + public void setUpdated(Integer updated) { + this.updated = updated; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -124,12 +151,13 @@ public boolean equals(Object o) { ImportPasswordsOutput importPasswordsOutput = (ImportPasswordsOutput) o; return Objects.equals(this.imported, importPasswordsOutput.imported) && Objects.equals(this.passwordsInFile, importPasswordsOutput.passwordsInFile) && - Objects.equals(this.successfullyParsed, importPasswordsOutput.successfullyParsed); + Objects.equals(this.successfullyParsed, importPasswordsOutput.successfullyParsed) && + Objects.equals(this.updated, importPasswordsOutput.updated); } @Override public int hashCode() { - return Objects.hash(imported, passwordsInFile, successfullyParsed); + return Objects.hash(imported, passwordsInFile, successfullyParsed, updated); } @Override @@ -139,6 +167,7 @@ public String toString() { sb.append(" imported: ").append(toIndentedString(imported)).append("\n"); sb.append(" passwordsInFile: ").append(toIndentedString(passwordsInFile)).append("\n"); sb.append(" successfullyParsed: ").append(toIndentedString(successfullyParsed)).append("\n"); + sb.append(" updated: ").append(toIndentedString(updated)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/ItemVersion.java b/src/main/java/io/akeyless/client/model/ItemVersion.java index b5abc0ea..663d1520 100644 --- a/src/main/java/io/akeyless/client/model/ItemVersion.java +++ b/src/main/java/io/akeyless/client/model/ItemVersion.java @@ -20,6 +20,7 @@ import com.google.gson.annotations.SerializedName; import com.google.gson.stream.JsonReader; import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.CertificateVersionInfo; import io.swagger.annotations.ApiModel; import io.swagger.annotations.ApiModelProperty; import java.io.IOException; @@ -38,6 +39,10 @@ public class ItemVersion { @SerializedName(SERIALIZED_NAME_ACCESS_DATE_DISPLAY) private String accessDateDisplay; + public static final String SERIALIZED_NAME_CERTIFICATE_VERSION_INFO = "certificate_version_info"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_VERSION_INFO) + private CertificateVersionInfo certificateVersionInfo; + public static final String SERIALIZED_NAME_CREATION_DATE = "creation_date"; @SerializedName(SERIALIZED_NAME_CREATION_DATE) private OffsetDateTime creationDate; @@ -119,6 +124,29 @@ public void setAccessDateDisplay(String accessDateDisplay) { } + public ItemVersion certificateVersionInfo(CertificateVersionInfo certificateVersionInfo) { + + this.certificateVersionInfo = certificateVersionInfo; + return this; + } + + /** + * Get certificateVersionInfo + * @return certificateVersionInfo + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public CertificateVersionInfo getCertificateVersionInfo() { + return certificateVersionInfo; + } + + + public void setCertificateVersionInfo(CertificateVersionInfo certificateVersionInfo) { + this.certificateVersionInfo = certificateVersionInfo; + } + + public ItemVersion creationDate(OffsetDateTime creationDate) { this.creationDate = creationDate; @@ -314,6 +342,7 @@ public boolean equals(Object o) { ItemVersion itemVersion = (ItemVersion) o; return Objects.equals(this.accessDate, itemVersion.accessDate) && Objects.equals(this.accessDateDisplay, itemVersion.accessDateDisplay) && + Objects.equals(this.certificateVersionInfo, itemVersion.certificateVersionInfo) && Objects.equals(this.creationDate, itemVersion.creationDate) && Objects.equals(this.customerFragmentId, itemVersion.customerFragmentId) && Objects.equals(this.deletionDate, itemVersion.deletionDate) && @@ -326,7 +355,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessDate, accessDateDisplay, creationDate, customerFragmentId, deletionDate, itemVersionState, modificationDate, protectionKeyName, version, withCustomerFragment); + return Objects.hash(accessDate, accessDateDisplay, certificateVersionInfo, creationDate, customerFragmentId, deletionDate, itemVersionState, modificationDate, protectionKeyName, version, withCustomerFragment); } @Override @@ -335,6 +364,7 @@ public String toString() { sb.append("class ItemVersion {\n"); sb.append(" accessDate: ").append(toIndentedString(accessDate)).append("\n"); sb.append(" accessDateDisplay: ").append(toIndentedString(accessDateDisplay)).append("\n"); + sb.append(" certificateVersionInfo: ").append(toIndentedString(certificateVersionInfo)).append("\n"); sb.append(" creationDate: ").append(toIndentedString(creationDate)).append("\n"); sb.append(" customerFragmentId: ").append(toIndentedString(customerFragmentId)).append("\n"); sb.append(" deletionDate: ").append(toIndentedString(deletionDate)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/ProvisionCertificate.java b/src/main/java/io/akeyless/client/model/ProvisionCertificate.java new file mode 100644 index 00000000..cbac939e --- /dev/null +++ b/src/main/java/io/akeyless/client/model/ProvisionCertificate.java @@ -0,0 +1,246 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * provisionCertificate is a command that provisions a certificate content to a target + */ +@ApiModel(description = "provisionCertificate is a command that provisions a certificate content to a target") +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ProvisionCertificate { + public static final String SERIALIZED_NAME_DISPLAY_ID = "display-id"; + @SerializedName(SERIALIZED_NAME_DISPLAY_ID) + private String displayId; + + public static final String SERIALIZED_NAME_ITEM_ID = "item-id"; + @SerializedName(SERIALIZED_NAME_ITEM_ID) + private Long itemId; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_NAME = "name"; + @SerializedName(SERIALIZED_NAME_NAME) + private String name; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public ProvisionCertificate() { + } + + public ProvisionCertificate displayId(String displayId) { + + this.displayId = displayId; + return this; + } + + /** + * Certificate display ID + * @return displayId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Certificate display ID") + + public String getDisplayId() { + return displayId; + } + + + public void setDisplayId(String displayId) { + this.displayId = displayId; + } + + + public ProvisionCertificate itemId(Long itemId) { + + this.itemId = itemId; + return this; + } + + /** + * Certificate item ID + * @return itemId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Certificate item ID") + + public Long getItemId() { + return itemId; + } + + + public void setItemId(Long itemId) { + this.itemId = itemId; + } + + + public ProvisionCertificate json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public ProvisionCertificate name(String name) { + + this.name = name; + return this; + } + + /** + * Certificate name + * @return name + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "Certificate name") + + public String getName() { + return name; + } + + + public void setName(String name) { + this.name = name; + } + + + public ProvisionCertificate token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public ProvisionCertificate uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ProvisionCertificate provisionCertificate = (ProvisionCertificate) o; + return Objects.equals(this.displayId, provisionCertificate.displayId) && + Objects.equals(this.itemId, provisionCertificate.itemId) && + Objects.equals(this.json, provisionCertificate.json) && + Objects.equals(this.name, provisionCertificate.name) && + Objects.equals(this.token, provisionCertificate.token) && + Objects.equals(this.uidToken, provisionCertificate.uidToken); + } + + @Override + public int hashCode() { + return Objects.hash(displayId, itemId, json, name, token, uidToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ProvisionCertificate {\n"); + sb.append(" displayId: ").append(toIndentedString(displayId)).append("\n"); + sb.append(" itemId: ").append(toIndentedString(itemId)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" name: ").append(toIndentedString(name)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/ProvisionCertificateOutput.java b/src/main/java/io/akeyless/client/model/ProvisionCertificateOutput.java new file mode 100644 index 00000000..0e9285f1 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/ProvisionCertificateOutput.java @@ -0,0 +1,198 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; +import org.threeten.bp.OffsetDateTime; + +/** + * ProvisionCertificateOutput + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ProvisionCertificateOutput { + public static final String SERIALIZED_NAME_FAIL_MESSAGE = "FailMessage"; + @SerializedName(SERIALIZED_NAME_FAIL_MESSAGE) + private String failMessage; + + public static final String SERIALIZED_NAME_SUCCESS_MESSAGE = "SuccessMessage"; + @SerializedName(SERIALIZED_NAME_SUCCESS_MESSAGE) + private String successMessage; + + public static final String SERIALIZED_NAME_HOST_NAMES = "host_names"; + @SerializedName(SERIALIZED_NAME_HOST_NAMES) + private List hostNames = null; + + public static final String SERIALIZED_NAME_PROVISIONED_AT = "provisioned_at"; + @SerializedName(SERIALIZED_NAME_PROVISIONED_AT) + private OffsetDateTime provisionedAt; + + public ProvisionCertificateOutput() { + } + + public ProvisionCertificateOutput failMessage(String failMessage) { + + this.failMessage = failMessage; + return this; + } + + /** + * Get failMessage + * @return failMessage + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getFailMessage() { + return failMessage; + } + + + public void setFailMessage(String failMessage) { + this.failMessage = failMessage; + } + + + public ProvisionCertificateOutput successMessage(String successMessage) { + + this.successMessage = successMessage; + return this; + } + + /** + * Get successMessage + * @return successMessage + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getSuccessMessage() { + return successMessage; + } + + + public void setSuccessMessage(String successMessage) { + this.successMessage = successMessage; + } + + + public ProvisionCertificateOutput hostNames(List hostNames) { + + this.hostNames = hostNames; + return this; + } + + public ProvisionCertificateOutput addHostNamesItem(String hostNamesItem) { + if (this.hostNames == null) { + this.hostNames = new ArrayList(); + } + this.hostNames.add(hostNamesItem); + return this; + } + + /** + * Get hostNames + * @return hostNames + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public List getHostNames() { + return hostNames; + } + + + public void setHostNames(List hostNames) { + this.hostNames = hostNames; + } + + + public ProvisionCertificateOutput provisionedAt(OffsetDateTime provisionedAt) { + + this.provisionedAt = provisionedAt; + return this; + } + + /** + * Get provisionedAt + * @return provisionedAt + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public OffsetDateTime getProvisionedAt() { + return provisionedAt; + } + + + public void setProvisionedAt(OffsetDateTime provisionedAt) { + this.provisionedAt = provisionedAt; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ProvisionCertificateOutput provisionCertificateOutput = (ProvisionCertificateOutput) o; + return Objects.equals(this.failMessage, provisionCertificateOutput.failMessage) && + Objects.equals(this.successMessage, provisionCertificateOutput.successMessage) && + Objects.equals(this.hostNames, provisionCertificateOutput.hostNames) && + Objects.equals(this.provisionedAt, provisionCertificateOutput.provisionedAt); + } + + @Override + public int hashCode() { + return Objects.hash(failMessage, successMessage, hostNames, provisionedAt); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ProvisionCertificateOutput {\n"); + sb.append(" failMessage: ").append(toIndentedString(failMessage)).append("\n"); + sb.append(" successMessage: ").append(toIndentedString(successMessage)).append("\n"); + sb.append(" hostNames: ").append(toIndentedString(hostNames)).append("\n"); + sb.append(" provisionedAt: ").append(toIndentedString(provisionedAt)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/RenewCertificate.java b/src/main/java/io/akeyless/client/model/RenewCertificate.java new file mode 100644 index 00000000..0ea24ed7 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/RenewCertificate.java @@ -0,0 +1,245 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * RenewCertificate + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class RenewCertificate { + public static final String SERIALIZED_NAME_GENERATE_KEY = "generate-key"; + @SerializedName(SERIALIZED_NAME_GENERATE_KEY) + private Boolean generateKey; + + public static final String SERIALIZED_NAME_ITEM_ID = "item-id"; + @SerializedName(SERIALIZED_NAME_ITEM_ID) + private Long itemId; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_NAME = "name"; + @SerializedName(SERIALIZED_NAME_NAME) + private String name; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public RenewCertificate() { + } + + public RenewCertificate generateKey(Boolean generateKey) { + + this.generateKey = generateKey; + return this; + } + + /** + * Generate a new key as part of the certificate renewal + * @return generateKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Generate a new key as part of the certificate renewal") + + public Boolean getGenerateKey() { + return generateKey; + } + + + public void setGenerateKey(Boolean generateKey) { + this.generateKey = generateKey; + } + + + public RenewCertificate itemId(Long itemId) { + + this.itemId = itemId; + return this; + } + + /** + * Certificate item id + * @return itemId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Certificate item id") + + public Long getItemId() { + return itemId; + } + + + public void setItemId(Long itemId) { + this.itemId = itemId; + } + + + public RenewCertificate json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public RenewCertificate name(String name) { + + this.name = name; + return this; + } + + /** + * Certificate name + * @return name + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Certificate name") + + public String getName() { + return name; + } + + + public void setName(String name) { + this.name = name; + } + + + public RenewCertificate token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public RenewCertificate uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + RenewCertificate renewCertificate = (RenewCertificate) o; + return Objects.equals(this.generateKey, renewCertificate.generateKey) && + Objects.equals(this.itemId, renewCertificate.itemId) && + Objects.equals(this.json, renewCertificate.json) && + Objects.equals(this.name, renewCertificate.name) && + Objects.equals(this.token, renewCertificate.token) && + Objects.equals(this.uidToken, renewCertificate.uidToken); + } + + @Override + public int hashCode() { + return Objects.hash(generateKey, itemId, json, name, token, uidToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class RenewCertificate {\n"); + sb.append(" generateKey: ").append(toIndentedString(generateKey)).append("\n"); + sb.append(" itemId: ").append(toIndentedString(itemId)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" name: ").append(toIndentedString(name)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/RenewCertificateOutput.java b/src/main/java/io/akeyless/client/model/RenewCertificateOutput.java new file mode 100644 index 00000000..0af86bdd --- /dev/null +++ b/src/main/java/io/akeyless/client/model/RenewCertificateOutput.java @@ -0,0 +1,245 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * RenewCertificateOutput + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class RenewCertificateOutput { + public static final String SERIALIZED_NAME_CERT = "cert"; + @SerializedName(SERIALIZED_NAME_CERT) + private String cert; + + public static final String SERIALIZED_NAME_CERT_DISPLAY_ID = "cert_display_id"; + @SerializedName(SERIALIZED_NAME_CERT_DISPLAY_ID) + private String certDisplayId; + + public static final String SERIALIZED_NAME_ITEM_ID = "item_id"; + @SerializedName(SERIALIZED_NAME_ITEM_ID) + private String itemId; + + public static final String SERIALIZED_NAME_PARENT_CERT = "parent_cert"; + @SerializedName(SERIALIZED_NAME_PARENT_CERT) + private String parentCert; + + public static final String SERIALIZED_NAME_PRIVATE_KEY = "private_key"; + @SerializedName(SERIALIZED_NAME_PRIVATE_KEY) + private String privateKey; + + public static final String SERIALIZED_NAME_READING_TOKEN = "reading_token"; + @SerializedName(SERIALIZED_NAME_READING_TOKEN) + private String readingToken; + + public RenewCertificateOutput() { + } + + public RenewCertificateOutput cert(String cert) { + + this.cert = cert; + return this; + } + + /** + * Get cert + * @return cert + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getCert() { + return cert; + } + + + public void setCert(String cert) { + this.cert = cert; + } + + + public RenewCertificateOutput certDisplayId(String certDisplayId) { + + this.certDisplayId = certDisplayId; + return this; + } + + /** + * Get certDisplayId + * @return certDisplayId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getCertDisplayId() { + return certDisplayId; + } + + + public void setCertDisplayId(String certDisplayId) { + this.certDisplayId = certDisplayId; + } + + + public RenewCertificateOutput itemId(String itemId) { + + this.itemId = itemId; + return this; + } + + /** + * Get itemId + * @return itemId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getItemId() { + return itemId; + } + + + public void setItemId(String itemId) { + this.itemId = itemId; + } + + + public RenewCertificateOutput parentCert(String parentCert) { + + this.parentCert = parentCert; + return this; + } + + /** + * Get parentCert + * @return parentCert + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getParentCert() { + return parentCert; + } + + + public void setParentCert(String parentCert) { + this.parentCert = parentCert; + } + + + public RenewCertificateOutput privateKey(String privateKey) { + + this.privateKey = privateKey; + return this; + } + + /** + * Get privateKey + * @return privateKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getPrivateKey() { + return privateKey; + } + + + public void setPrivateKey(String privateKey) { + this.privateKey = privateKey; + } + + + public RenewCertificateOutput readingToken(String readingToken) { + + this.readingToken = readingToken; + return this; + } + + /** + * Get readingToken + * @return readingToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getReadingToken() { + return readingToken; + } + + + public void setReadingToken(String readingToken) { + this.readingToken = readingToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + RenewCertificateOutput renewCertificateOutput = (RenewCertificateOutput) o; + return Objects.equals(this.cert, renewCertificateOutput.cert) && + Objects.equals(this.certDisplayId, renewCertificateOutput.certDisplayId) && + Objects.equals(this.itemId, renewCertificateOutput.itemId) && + Objects.equals(this.parentCert, renewCertificateOutput.parentCert) && + Objects.equals(this.privateKey, renewCertificateOutput.privateKey) && + Objects.equals(this.readingToken, renewCertificateOutput.readingToken); + } + + @Override + public int hashCode() { + return Objects.hash(cert, certDisplayId, itemId, parentCert, privateKey, readingToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class RenewCertificateOutput {\n"); + sb.append(" cert: ").append(toIndentedString(cert)).append("\n"); + sb.append(" certDisplayId: ").append(toIndentedString(certDisplayId)).append("\n"); + sb.append(" itemId: ").append(toIndentedString(itemId)).append("\n"); + sb.append(" parentCert: ").append(toIndentedString(parentCert)).append("\n"); + sb.append(" privateKey: ").append(toIndentedString(privateKey)).append("\n"); + sb.append(" readingToken: ").append(toIndentedString(readingToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java b/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java index ca474468..78a2dfdd 100644 --- a/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java +++ b/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java @@ -144,6 +144,10 @@ public class SecureRemoteAccess { @SerializedName(SERIALIZED_NAME_TARGET_HOSTS) private List targetHosts = null; + public static final String SERIALIZED_NAME_TARGETS = "targets"; + @SerializedName(SERIALIZED_NAME_TARGETS) + private List targets = null; + public static final String SERIALIZED_NAME_URL = "url"; @SerializedName(SERIALIZED_NAME_URL) private String url; @@ -819,6 +823,37 @@ public void setTargetHosts(List targetHosts) { } + public SecureRemoteAccess targets(List targets) { + + this.targets = targets; + return this; + } + + public SecureRemoteAccess addTargetsItem(String targetsItem) { + if (this.targets == null) { + this.targets = new ArrayList(); + } + this.targets.add(targetsItem); + return this; + } + + /** + * Get targets + * @return targets + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public List getTargets() { + return targets; + } + + + public void setTargets(List targets) { + this.targets = targets; + } + + public SecureRemoteAccess url(String url) { this.url = url; @@ -925,6 +960,7 @@ public boolean equals(Object o) { Objects.equals(this.sshPrivateKey, secureRemoteAccess.sshPrivateKey) && Objects.equals(this.sshUser, secureRemoteAccess.sshUser) && Objects.equals(this.targetHosts, secureRemoteAccess.targetHosts) && + Objects.equals(this.targets, secureRemoteAccess.targets) && Objects.equals(this.url, secureRemoteAccess.url) && Objects.equals(this.useInternalBastion, secureRemoteAccess.useInternalBastion) && Objects.equals(this.webProxy, secureRemoteAccess.webProxy); @@ -932,7 +968,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accountId, allowPortForwarding, allowProvidingExternalUsername, bastionApi, bastionIssuer, bastionIssuerId, bastionSsh, category, dashboardUrl, dbName, domain, enable, endpoint, host, hostProviderType, isCli, isWeb, isolated, _native, rdGatewayServer, rdpUser, region, rotateAfterDisconnect, schema, sshPassword, sshPrivateKey, sshUser, targetHosts, url, useInternalBastion, webProxy); + return Objects.hash(accountId, allowPortForwarding, allowProvidingExternalUsername, bastionApi, bastionIssuer, bastionIssuerId, bastionSsh, category, dashboardUrl, dbName, domain, enable, endpoint, host, hostProviderType, isCli, isWeb, isolated, _native, rdGatewayServer, rdpUser, region, rotateAfterDisconnect, schema, sshPassword, sshPrivateKey, sshUser, targetHosts, targets, url, useInternalBastion, webProxy); } @Override @@ -967,6 +1003,7 @@ public String toString() { sb.append(" sshPrivateKey: ").append(toIndentedString(sshPrivateKey)).append("\n"); sb.append(" sshUser: ").append(toIndentedString(sshUser)).append("\n"); sb.append(" targetHosts: ").append(toIndentedString(targetHosts)).append("\n"); + sb.append(" targets: ").append(toIndentedString(targets)).append("\n"); sb.append(" url: ").append(toIndentedString(url)).append("\n"); sb.append(" useInternalBastion: ").append(toIndentedString(useInternalBastion)).append("\n"); sb.append(" webProxy: ").append(toIndentedString(webProxy)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/ServerInventoryPayload.java b/src/main/java/io/akeyless/client/model/ServerInventoryPayload.java index 78bc0b1f..b5ca4744 100644 --- a/src/main/java/io/akeyless/client/model/ServerInventoryPayload.java +++ b/src/main/java/io/akeyless/client/model/ServerInventoryPayload.java @@ -23,6 +23,7 @@ import io.swagger.annotations.ApiModel; import io.swagger.annotations.ApiModelProperty; import java.io.IOException; +import java.util.ArrayList; import java.util.HashMap; import java.util.List; import java.util.Map; @@ -56,6 +57,10 @@ public class ServerInventoryPayload { @SerializedName(SERIALIZED_NAME_SERVER_TARGETS_PATH_TEMPLATE) private String serverTargetsPathTemplate; + public static final String SERIALIZED_NAME_USER_GROUPS = "user_groups"; + @SerializedName(SERIALIZED_NAME_USER_GROUPS) + private List userGroups = null; + public static final String SERIALIZED_NAME_USERS_IGNORE_LIST = "users_ignore_list"; @SerializedName(SERIALIZED_NAME_USERS_IGNORE_LIST) private Map usersIgnoreList = null; @@ -205,6 +210,37 @@ public void setServerTargetsPathTemplate(String serverTargetsPathTemplate) { } + public ServerInventoryPayload userGroups(List userGroups) { + + this.userGroups = userGroups; + return this; + } + + public ServerInventoryPayload addUserGroupsItem(String userGroupsItem) { + if (this.userGroups == null) { + this.userGroups = new ArrayList(); + } + this.userGroups.add(userGroupsItem); + return this; + } + + /** + * Get userGroups + * @return userGroups + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public List getUserGroups() { + return userGroups; + } + + + public void setUserGroups(List userGroups) { + this.userGroups = userGroups; + } + + public ServerInventoryPayload usersIgnoreList(Map usersIgnoreList) { this.usersIgnoreList = usersIgnoreList; @@ -274,13 +310,14 @@ public boolean equals(Object o) { Objects.equals(this.enableRdpSra, serverInventoryPayload.enableRdpSra) && Objects.equals(this.migrationTargetId, serverInventoryPayload.migrationTargetId) && Objects.equals(this.serverTargetsPathTemplate, serverInventoryPayload.serverTargetsPathTemplate) && + Objects.equals(this.userGroups, serverInventoryPayload.userGroups) && Objects.equals(this.usersIgnoreList, serverInventoryPayload.usersIgnoreList) && Objects.equals(this.usersRotatedSecretsPathTemplate, serverInventoryPayload.usersRotatedSecretsPathTemplate); } @Override public int hashCode() { - return Objects.hash(autoRotate, autoRotateIntervalInDays, autoRotateRotationHour, enableRdpSra, migrationTargetId, serverTargetsPathTemplate, usersIgnoreList, usersRotatedSecretsPathTemplate); + return Objects.hash(autoRotate, autoRotateIntervalInDays, autoRotateRotationHour, enableRdpSra, migrationTargetId, serverTargetsPathTemplate, userGroups, usersIgnoreList, usersRotatedSecretsPathTemplate); } @Override @@ -293,6 +330,7 @@ public String toString() { sb.append(" enableRdpSra: ").append(toIndentedString(enableRdpSra)).append("\n"); sb.append(" migrationTargetId: ").append(toIndentedString(migrationTargetId)).append("\n"); sb.append(" serverTargetsPathTemplate: ").append(toIndentedString(serverTargetsPathTemplate)).append("\n"); + sb.append(" userGroups: ").append(toIndentedString(userGroups)).append("\n"); sb.append(" usersIgnoreList: ").append(toIndentedString(usersIgnoreList)).append("\n"); sb.append(" usersRotatedSecretsPathTemplate: ").append(toIndentedString(usersRotatedSecretsPathTemplate)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/SetRoleRule.java b/src/main/java/io/akeyless/client/model/SetRoleRule.java index b280e347..6a0b180c 100644 --- a/src/main/java/io/akeyless/client/model/SetRoleRule.java +++ b/src/main/java/io/akeyless/client/model/SetRoleRule.java @@ -170,11 +170,11 @@ public SetRoleRule ruleType(String ruleType) { } /** - * item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule or sra-reports-rule + * item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule or sra-reports-rule, sra-rule * @return ruleType **/ @javax.annotation.Nullable - @ApiModelProperty(value = "item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule or sra-reports-rule") + @ApiModelProperty(value = "item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule or sra-reports-rule, sra-rule") public String getRuleType() { return ruleType; diff --git a/src/main/java/io/akeyless/client/model/SignDataWithClassicKey.java b/src/main/java/io/akeyless/client/model/SignDataWithClassicKey.java index bd54ec3f..e9fa2386 100644 --- a/src/main/java/io/akeyless/client/model/SignDataWithClassicKey.java +++ b/src/main/java/io/akeyless/client/model/SignDataWithClassicKey.java @@ -45,6 +45,10 @@ public class SignDataWithClassicKey { @SerializedName(SERIALIZED_NAME_HASHING_METHOD) private String hashingMethod = "SHA256"; + public static final String SERIALIZED_NAME_IGNORE_CACHE = "ignore-cache"; + @SerializedName(SERIALIZED_NAME_IGNORE_CACHE) + private String ignoreCache = "false"; + public static final String SERIALIZED_NAME_JSON = "json"; @SerializedName(SERIALIZED_NAME_JSON) private Boolean json = false; @@ -160,6 +164,29 @@ public void setHashingMethod(String hashingMethod) { } + public SignDataWithClassicKey ignoreCache(String ignoreCache) { + + this.ignoreCache = ignoreCache; + return this; + } + + /** + * Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI + * @return ignoreCache + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI") + + public String getIgnoreCache() { + return ignoreCache; + } + + + public void setIgnoreCache(String ignoreCache) { + this.ignoreCache = ignoreCache; + } + + public SignDataWithClassicKey json(Boolean json) { this.json = json; @@ -288,6 +315,7 @@ public boolean equals(Object o) { Objects.equals(this.displayId, signDataWithClassicKey.displayId) && Objects.equals(this.hashed, signDataWithClassicKey.hashed) && Objects.equals(this.hashingMethod, signDataWithClassicKey.hashingMethod) && + Objects.equals(this.ignoreCache, signDataWithClassicKey.ignoreCache) && Objects.equals(this.json, signDataWithClassicKey.json) && Objects.equals(this.name, signDataWithClassicKey.name) && Objects.equals(this.token, signDataWithClassicKey.token) && @@ -297,7 +325,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(data, displayId, hashed, hashingMethod, json, name, token, uidToken, version); + return Objects.hash(data, displayId, hashed, hashingMethod, ignoreCache, json, name, token, uidToken, version); } @Override @@ -308,6 +336,7 @@ public String toString() { sb.append(" displayId: ").append(toIndentedString(displayId)).append("\n"); sb.append(" hashed: ").append(toIndentedString(hashed)).append("\n"); sb.append(" hashingMethod: ").append(toIndentedString(hashingMethod)).append("\n"); + sb.append(" ignoreCache: ").append(toIndentedString(ignoreCache)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/SignEcDsa.java b/src/main/java/io/akeyless/client/model/SignEcDsa.java index 3e813b07..94b66612 100644 --- a/src/main/java/io/akeyless/client/model/SignEcDsa.java +++ b/src/main/java/io/akeyless/client/model/SignEcDsa.java @@ -50,6 +50,10 @@ public class SignEcDsa { @SerializedName(SERIALIZED_NAME_MESSAGE) private String message; + public static final String SERIALIZED_NAME_PREHASHED = "prehashed"; + @SerializedName(SERIALIZED_NAME_PREHASHED) + private Boolean prehashed; + public static final String SERIALIZED_NAME_TOKEN = "token"; @SerializedName(SERIALIZED_NAME_TOKEN) private String token; @@ -58,6 +62,10 @@ public class SignEcDsa { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_VERSION = "version"; + @SerializedName(SERIALIZED_NAME_VERSION) + private Integer version; + public SignEcDsa() { } @@ -176,6 +184,29 @@ public void setMessage(String message) { } + public SignEcDsa prehashed(Boolean prehashed) { + + this.prehashed = prehashed; + return this; + } + + /** + * Markes that the message is already hashed + * @return prehashed + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Markes that the message is already hashed") + + public Boolean getPrehashed() { + return prehashed; + } + + + public void setPrehashed(Boolean prehashed) { + this.prehashed = prehashed; + } + + public SignEcDsa token(String token) { this.token = token; @@ -222,6 +253,29 @@ public void setUidToken(String uidToken) { } + public SignEcDsa version(Integer version) { + + this.version = version; + return this; + } + + /** + * The version of the key to use for signing + * @return version + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The version of the key to use for signing") + + public Integer getVersion() { + return version; + } + + + public void setVersion(Integer version) { + this.version = version; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -236,13 +290,15 @@ public boolean equals(Object o) { Objects.equals(this.json, signEcDsa.json) && Objects.equals(this.keyName, signEcDsa.keyName) && Objects.equals(this.message, signEcDsa.message) && + Objects.equals(this.prehashed, signEcDsa.prehashed) && Objects.equals(this.token, signEcDsa.token) && - Objects.equals(this.uidToken, signEcDsa.uidToken); + Objects.equals(this.uidToken, signEcDsa.uidToken) && + Objects.equals(this.version, signEcDsa.version); } @Override public int hashCode() { - return Objects.hash(displayId, itemId, json, keyName, message, token, uidToken); + return Objects.hash(displayId, itemId, json, keyName, message, prehashed, token, uidToken, version); } @Override @@ -254,8 +310,10 @@ public String toString() { sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyName: ").append(toIndentedString(keyName)).append("\n"); sb.append(" message: ").append(toIndentedString(message)).append("\n"); + sb.append(" prehashed: ").append(toIndentedString(prehashed)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/SignPKCS1.java b/src/main/java/io/akeyless/client/model/SignPKCS1.java index 86387ef2..492cc8af 100644 --- a/src/main/java/io/akeyless/client/model/SignPKCS1.java +++ b/src/main/java/io/akeyless/client/model/SignPKCS1.java @@ -34,6 +34,14 @@ public class SignPKCS1 { @SerializedName(SERIALIZED_NAME_DISPLAY_ID) private String displayId; + public static final String SERIALIZED_NAME_HASH_FUNCTION = "hash-function"; + @SerializedName(SERIALIZED_NAME_HASH_FUNCTION) + private String hashFunction; + + public static final String SERIALIZED_NAME_INPUT_FORMAT = "input-format"; + @SerializedName(SERIALIZED_NAME_INPUT_FORMAT) + private String inputFormat; + public static final String SERIALIZED_NAME_ITEM_ID = "item-id"; @SerializedName(SERIALIZED_NAME_ITEM_ID) private Long itemId; @@ -50,6 +58,10 @@ public class SignPKCS1 { @SerializedName(SERIALIZED_NAME_MESSAGE) private String message; + public static final String SERIALIZED_NAME_PREHASHED = "prehashed"; + @SerializedName(SERIALIZED_NAME_PREHASHED) + private Boolean prehashed; + public static final String SERIALIZED_NAME_TOKEN = "token"; @SerializedName(SERIALIZED_NAME_TOKEN) private String token; @@ -58,6 +70,10 @@ public class SignPKCS1 { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_VERSION = "version"; + @SerializedName(SERIALIZED_NAME_VERSION) + private Integer version; + public SignPKCS1() { } @@ -84,6 +100,52 @@ public void setDisplayId(String displayId) { } + public SignPKCS1 hashFunction(String hashFunction) { + + this.hashFunction = hashFunction; + return this; + } + + /** + * HashFunction defines the hash function (e.g. sha-256) + * @return hashFunction + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "HashFunction defines the hash function (e.g. sha-256)") + + public String getHashFunction() { + return hashFunction; + } + + + public void setHashFunction(String hashFunction) { + this.hashFunction = hashFunction; + } + + + public SignPKCS1 inputFormat(String inputFormat) { + + this.inputFormat = inputFormat; + return this; + } + + /** + * Select default assumed format for the plaintext message. Currently supported options: [base64] + * @return inputFormat + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Select default assumed format for the plaintext message. Currently supported options: [base64]") + + public String getInputFormat() { + return inputFormat; + } + + + public void setInputFormat(String inputFormat) { + this.inputFormat = inputFormat; + } + + public SignPKCS1 itemId(Long itemId) { this.itemId = itemId; @@ -176,6 +238,29 @@ public void setMessage(String message) { } + public SignPKCS1 prehashed(Boolean prehashed) { + + this.prehashed = prehashed; + return this; + } + + /** + * Markes that the message is already hashed + * @return prehashed + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Markes that the message is already hashed") + + public Boolean getPrehashed() { + return prehashed; + } + + + public void setPrehashed(Boolean prehashed) { + this.prehashed = prehashed; + } + + public SignPKCS1 token(String token) { this.token = token; @@ -222,6 +307,29 @@ public void setUidToken(String uidToken) { } + public SignPKCS1 version(Integer version) { + + this.version = version; + return this; + } + + /** + * The version of the key to use for signing + * @return version + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The version of the key to use for signing") + + public Integer getVersion() { + return version; + } + + + public void setVersion(Integer version) { + this.version = version; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -232,17 +340,21 @@ public boolean equals(Object o) { } SignPKCS1 signPKCS1 = (SignPKCS1) o; return Objects.equals(this.displayId, signPKCS1.displayId) && + Objects.equals(this.hashFunction, signPKCS1.hashFunction) && + Objects.equals(this.inputFormat, signPKCS1.inputFormat) && Objects.equals(this.itemId, signPKCS1.itemId) && Objects.equals(this.json, signPKCS1.json) && Objects.equals(this.keyName, signPKCS1.keyName) && Objects.equals(this.message, signPKCS1.message) && + Objects.equals(this.prehashed, signPKCS1.prehashed) && Objects.equals(this.token, signPKCS1.token) && - Objects.equals(this.uidToken, signPKCS1.uidToken); + Objects.equals(this.uidToken, signPKCS1.uidToken) && + Objects.equals(this.version, signPKCS1.version); } @Override public int hashCode() { - return Objects.hash(displayId, itemId, json, keyName, message, token, uidToken); + return Objects.hash(displayId, hashFunction, inputFormat, itemId, json, keyName, message, prehashed, token, uidToken, version); } @Override @@ -250,12 +362,16 @@ public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class SignPKCS1 {\n"); sb.append(" displayId: ").append(toIndentedString(displayId)).append("\n"); + sb.append(" hashFunction: ").append(toIndentedString(hashFunction)).append("\n"); + sb.append(" inputFormat: ").append(toIndentedString(inputFormat)).append("\n"); sb.append(" itemId: ").append(toIndentedString(itemId)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyName: ").append(toIndentedString(keyName)).append("\n"); sb.append(" message: ").append(toIndentedString(message)).append("\n"); + sb.append(" prehashed: ").append(toIndentedString(prehashed)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/SignPKCS1Output.java b/src/main/java/io/akeyless/client/model/SignPKCS1Output.java index 3e436229..78a28910 100644 --- a/src/main/java/io/akeyless/client/model/SignPKCS1Output.java +++ b/src/main/java/io/akeyless/client/model/SignPKCS1Output.java @@ -23,8 +23,6 @@ import io.swagger.annotations.ApiModel; import io.swagger.annotations.ApiModelProperty; import java.io.IOException; -import java.util.ArrayList; -import java.util.List; /** * SignPKCS1Output @@ -33,25 +31,17 @@ public class SignPKCS1Output { public static final String SERIALIZED_NAME_RESULT = "result"; @SerializedName(SERIALIZED_NAME_RESULT) - private List result = null; + private String result; public SignPKCS1Output() { } - public SignPKCS1Output result(List result) { + public SignPKCS1Output result(String result) { this.result = result; return this; } - public SignPKCS1Output addResultItem(Integer resultItem) { - if (this.result == null) { - this.result = new ArrayList(); - } - this.result.add(resultItem); - return this; - } - /** * Get result * @return result @@ -59,12 +49,12 @@ public SignPKCS1Output addResultItem(Integer resultItem) { @javax.annotation.Nullable @ApiModelProperty(value = "") - public List getResult() { + public String getResult() { return result; } - public void setResult(List result) { + public void setResult(String result) { this.result = result; } diff --git a/src/main/java/io/akeyless/client/model/SignRsaSsaPss.java b/src/main/java/io/akeyless/client/model/SignRsaSsaPss.java index 2989a92c..1ced611f 100644 --- a/src/main/java/io/akeyless/client/model/SignRsaSsaPss.java +++ b/src/main/java/io/akeyless/client/model/SignRsaSsaPss.java @@ -54,6 +54,10 @@ public class SignRsaSsaPss { @SerializedName(SERIALIZED_NAME_MESSAGE) private String message; + public static final String SERIALIZED_NAME_PREHASHED = "prehashed"; + @SerializedName(SERIALIZED_NAME_PREHASHED) + private Boolean prehashed; + public static final String SERIALIZED_NAME_TOKEN = "token"; @SerializedName(SERIALIZED_NAME_TOKEN) private String token; @@ -62,6 +66,10 @@ public class SignRsaSsaPss { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_VERSION = "version"; + @SerializedName(SERIALIZED_NAME_VERSION) + private Integer version; + public SignRsaSsaPss() { } @@ -203,6 +211,29 @@ public void setMessage(String message) { } + public SignRsaSsaPss prehashed(Boolean prehashed) { + + this.prehashed = prehashed; + return this; + } + + /** + * Markes that the message is already hashed + * @return prehashed + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Markes that the message is already hashed") + + public Boolean getPrehashed() { + return prehashed; + } + + + public void setPrehashed(Boolean prehashed) { + this.prehashed = prehashed; + } + + public SignRsaSsaPss token(String token) { this.token = token; @@ -249,6 +280,29 @@ public void setUidToken(String uidToken) { } + public SignRsaSsaPss version(Integer version) { + + this.version = version; + return this; + } + + /** + * The version of the key to use for signing + * @return version + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The version of the key to use for signing") + + public Integer getVersion() { + return version; + } + + + public void setVersion(Integer version) { + this.version = version; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -264,13 +318,15 @@ public boolean equals(Object o) { Objects.equals(this.json, signRsaSsaPss.json) && Objects.equals(this.keyName, signRsaSsaPss.keyName) && Objects.equals(this.message, signRsaSsaPss.message) && + Objects.equals(this.prehashed, signRsaSsaPss.prehashed) && Objects.equals(this.token, signRsaSsaPss.token) && - Objects.equals(this.uidToken, signRsaSsaPss.uidToken); + Objects.equals(this.uidToken, signRsaSsaPss.uidToken) && + Objects.equals(this.version, signRsaSsaPss.version); } @Override public int hashCode() { - return Objects.hash(displayId, hashFunction, itemId, json, keyName, message, token, uidToken); + return Objects.hash(displayId, hashFunction, itemId, json, keyName, message, prehashed, token, uidToken, version); } @Override @@ -283,8 +339,10 @@ public String toString() { sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyName: ").append(toIndentedString(keyName)).append("\n"); sb.append(" message: ").append(toIndentedString(message)).append("\n"); + sb.append(" prehashed: ").append(toIndentedString(prehashed)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/StaticSecretDetailsInfo.java b/src/main/java/io/akeyless/client/model/StaticSecretDetailsInfo.java index 9e7591f5..07858cf9 100644 --- a/src/main/java/io/akeyless/client/model/StaticSecretDetailsInfo.java +++ b/src/main/java/io/akeyless/client/model/StaticSecretDetailsInfo.java @@ -31,6 +31,10 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class StaticSecretDetailsInfo { + public static final String SERIALIZED_NAME_NOTIFY_ON_CHANGE_EVENT = "notify_on_change_event"; + @SerializedName(SERIALIZED_NAME_NOTIFY_ON_CHANGE_EVENT) + private Boolean notifyOnChangeEvent; + public static final String SERIALIZED_NAME_USERNAME = "username"; @SerializedName(SERIALIZED_NAME_USERNAME) private String username; @@ -46,6 +50,29 @@ public class StaticSecretDetailsInfo { public StaticSecretDetailsInfo() { } + public StaticSecretDetailsInfo notifyOnChangeEvent(Boolean notifyOnChangeEvent) { + + this.notifyOnChangeEvent = notifyOnChangeEvent; + return this; + } + + /** + * Get notifyOnChangeEvent + * @return notifyOnChangeEvent + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getNotifyOnChangeEvent() { + return notifyOnChangeEvent; + } + + + public void setNotifyOnChangeEvent(Boolean notifyOnChangeEvent) { + this.notifyOnChangeEvent = notifyOnChangeEvent; + } + + public StaticSecretDetailsInfo username(String username) { this.username = username; @@ -132,20 +159,22 @@ public boolean equals(Object o) { return false; } StaticSecretDetailsInfo staticSecretDetailsInfo = (StaticSecretDetailsInfo) o; - return Objects.equals(this.username, staticSecretDetailsInfo.username) && + return Objects.equals(this.notifyOnChangeEvent, staticSecretDetailsInfo.notifyOnChangeEvent) && + Objects.equals(this.username, staticSecretDetailsInfo.username) && Objects.equals(this.website, staticSecretDetailsInfo.website) && Objects.equals(this.websites, staticSecretDetailsInfo.websites); } @Override public int hashCode() { - return Objects.hash(username, website, websites); + return Objects.hash(notifyOnChangeEvent, username, website, websites); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class StaticSecretDetailsInfo {\n"); + sb.append(" notifyOnChangeEvent: ").append(toIndentedString(notifyOnChangeEvent)).append("\n"); sb.append(" username: ").append(toIndentedString(username)).append("\n"); sb.append(" website: ").append(toIndentedString(website)).append("\n"); sb.append(" websites: ").append(toIndentedString(websites)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/TargetItemVersion.java b/src/main/java/io/akeyless/client/model/TargetItemVersion.java index dffee3a5..8ba17128 100644 --- a/src/main/java/io/akeyless/client/model/TargetItemVersion.java +++ b/src/main/java/io/akeyless/client/model/TargetItemVersion.java @@ -20,6 +20,7 @@ import com.google.gson.annotations.SerializedName; import com.google.gson.stream.JsonReader; import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.CertificateVersionInfo; import io.swagger.annotations.ApiModel; import io.swagger.annotations.ApiModelProperty; import java.io.IOException; @@ -38,6 +39,10 @@ public class TargetItemVersion { @SerializedName(SERIALIZED_NAME_ACCESS_DATE_DISPLAY) private String accessDateDisplay; + public static final String SERIALIZED_NAME_CERTIFICATE_VERSION_INFO = "certificate_version_info"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_VERSION_INFO) + private CertificateVersionInfo certificateVersionInfo; + public static final String SERIALIZED_NAME_CREATION_DATE = "creation_date"; @SerializedName(SERIALIZED_NAME_CREATION_DATE) private OffsetDateTime creationDate; @@ -127,6 +132,29 @@ public void setAccessDateDisplay(String accessDateDisplay) { } + public TargetItemVersion certificateVersionInfo(CertificateVersionInfo certificateVersionInfo) { + + this.certificateVersionInfo = certificateVersionInfo; + return this; + } + + /** + * Get certificateVersionInfo + * @return certificateVersionInfo + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public CertificateVersionInfo getCertificateVersionInfo() { + return certificateVersionInfo; + } + + + public void setCertificateVersionInfo(CertificateVersionInfo certificateVersionInfo) { + this.certificateVersionInfo = certificateVersionInfo; + } + + public TargetItemVersion creationDate(OffsetDateTime creationDate) { this.creationDate = creationDate; @@ -368,6 +396,7 @@ public boolean equals(Object o) { TargetItemVersion targetItemVersion = (TargetItemVersion) o; return Objects.equals(this.accessDate, targetItemVersion.accessDate) && Objects.equals(this.accessDateDisplay, targetItemVersion.accessDateDisplay) && + Objects.equals(this.certificateVersionInfo, targetItemVersion.certificateVersionInfo) && Objects.equals(this.creationDate, targetItemVersion.creationDate) && Objects.equals(this.customerFragmentId, targetItemVersion.customerFragmentId) && Objects.equals(this.deletionDate, targetItemVersion.deletionDate) && @@ -382,7 +411,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessDate, accessDateDisplay, creationDate, customerFragmentId, deletionDate, itemVersionState, latestVersion, modificationDate, protectionKeyName, targetName, version, withCustomerFragment); + return Objects.hash(accessDate, accessDateDisplay, certificateVersionInfo, creationDate, customerFragmentId, deletionDate, itemVersionState, latestVersion, modificationDate, protectionKeyName, targetName, version, withCustomerFragment); } @Override @@ -391,6 +420,7 @@ public String toString() { sb.append("class TargetItemVersion {\n"); sb.append(" accessDate: ").append(toIndentedString(accessDate)).append("\n"); sb.append(" accessDateDisplay: ").append(toIndentedString(accessDateDisplay)).append("\n"); + sb.append(" certificateVersionInfo: ").append(toIndentedString(certificateVersionInfo)).append("\n"); sb.append(" creationDate: ").append(toIndentedString(creationDate)).append("\n"); sb.append(" customerFragmentId: ").append(toIndentedString(customerFragmentId)).append("\n"); sb.append(" deletionDate: ").append(toIndentedString(deletionDate)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethod.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethod.java index 64cab57e..0257b2b1 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethod.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethod.java @@ -39,6 +39,10 @@ public class UpdateAuthMethod { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -128,6 +132,29 @@ public void setBoundIps(List boundIps) { } + public UpdateAuthMethod description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethod forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -331,6 +358,7 @@ public boolean equals(Object o) { UpdateAuthMethod updateAuthMethod = (UpdateAuthMethod) o; return Objects.equals(this.accessExpires, updateAuthMethod.accessExpires) && Objects.equals(this.boundIps, updateAuthMethod.boundIps) && + Objects.equals(this.description, updateAuthMethod.description) && Objects.equals(this.forceSubClaims, updateAuthMethod.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethod.gwBoundIps) && Objects.equals(this.json, updateAuthMethod.json) && @@ -343,7 +371,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, token, uidToken); + return Objects.hash(accessExpires, boundIps, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, token, uidToken); } @Override @@ -352,6 +380,7 @@ public String toString() { sb.append("class UpdateAuthMethod {\n"); sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodAWSIAM.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodAWSIAM.java index 63937224..22301a2a 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodAWSIAM.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodAWSIAM.java @@ -68,6 +68,10 @@ public class UpdateAuthMethodAWSIAM { @SerializedName(SERIALIZED_NAME_BOUND_USER_NAME) private List boundUserName = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -375,6 +379,29 @@ public void setBoundUserName(List boundUserName) { } + public UpdateAuthMethodAWSIAM description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodAWSIAM forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -608,6 +635,7 @@ public boolean equals(Object o) { Objects.equals(this.boundRoleName, updateAuthMethodAWSIAM.boundRoleName) && Objects.equals(this.boundUserId, updateAuthMethodAWSIAM.boundUserId) && Objects.equals(this.boundUserName, updateAuthMethodAWSIAM.boundUserName) && + Objects.equals(this.description, updateAuthMethodAWSIAM.description) && Objects.equals(this.forceSubClaims, updateAuthMethodAWSIAM.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodAWSIAM.gwBoundIps) && Objects.equals(this.json, updateAuthMethodAWSIAM.json) && @@ -621,7 +649,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundArn, boundAwsAccountId, boundIps, boundResourceId, boundRoleId, boundRoleName, boundUserId, boundUserName, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, stsUrl, token, uidToken); + return Objects.hash(accessExpires, boundArn, boundAwsAccountId, boundIps, boundResourceId, boundRoleId, boundRoleName, boundUserId, boundUserName, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, stsUrl, token, uidToken); } @Override @@ -637,6 +665,7 @@ public String toString() { sb.append(" boundRoleName: ").append(toIndentedString(boundRoleName)).append("\n"); sb.append(" boundUserId: ").append(toIndentedString(boundUserId)).append("\n"); sb.append(" boundUserName: ").append(toIndentedString(boundUserName)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodAzureAD.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodAzureAD.java index 6be88049..95568330 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodAzureAD.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodAzureAD.java @@ -80,6 +80,10 @@ public class UpdateAuthMethodAzureAD { @SerializedName(SERIALIZED_NAME_BOUND_TENANT_ID) private String boundTenantId; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -153,11 +157,11 @@ public UpdateAuthMethodAzureAD audience(String audience) { } /** - * The audience in the JWT + * Deprecated (Deprecated) The audience in the JWT * @return audience **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The audience in the JWT") + @ApiModelProperty(value = "Deprecated (Deprecated) The audience in the JWT") public String getAudience() { return audience; @@ -471,6 +475,29 @@ public void setBoundTenantId(String boundTenantId) { } + public UpdateAuthMethodAzureAD description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodAzureAD forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -730,6 +757,7 @@ public boolean equals(Object o) { Objects.equals(this.boundSpid, updateAuthMethodAzureAD.boundSpid) && Objects.equals(this.boundSubId, updateAuthMethodAzureAD.boundSubId) && Objects.equals(this.boundTenantId, updateAuthMethodAzureAD.boundTenantId) && + Objects.equals(this.description, updateAuthMethodAzureAD.description) && Objects.equals(this.forceSubClaims, updateAuthMethodAzureAD.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodAzureAD.gwBoundIps) && Objects.equals(this.issuer, updateAuthMethodAzureAD.issuer) && @@ -744,7 +772,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundGroupId, boundIps, boundProviders, boundResourceId, boundResourceNames, boundResourceTypes, boundRgId, boundSpid, boundSubId, boundTenantId, forceSubClaims, gwBoundIps, issuer, json, jwksUri, jwtTtl, name, newName, token, uidToken); + return Objects.hash(accessExpires, audience, boundGroupId, boundIps, boundProviders, boundResourceId, boundResourceNames, boundResourceTypes, boundRgId, boundSpid, boundSubId, boundTenantId, description, forceSubClaims, gwBoundIps, issuer, json, jwksUri, jwtTtl, name, newName, token, uidToken); } @Override @@ -763,6 +791,7 @@ public String toString() { sb.append(" boundSpid: ").append(toIndentedString(boundSpid)).append("\n"); sb.append(" boundSubId: ").append(toIndentedString(boundSubId)).append("\n"); sb.append(" boundTenantId: ").append(toIndentedString(boundTenantId)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" issuer: ").append(toIndentedString(issuer)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodCert.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodCert.java index b82c152e..774577ed 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodCert.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodCert.java @@ -72,6 +72,10 @@ public class UpdateAuthMethodCert { @SerializedName(SERIALIZED_NAME_CERTIFICATE_DATA) private String certificateData; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -401,6 +405,29 @@ public void setCertificateData(String certificateData) { } + public UpdateAuthMethodCert description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodCert forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -666,6 +693,7 @@ public boolean equals(Object o) { Objects.equals(this.boundOrganizationalUnits, updateAuthMethodCert.boundOrganizationalUnits) && Objects.equals(this.boundUriSans, updateAuthMethodCert.boundUriSans) && Objects.equals(this.certificateData, updateAuthMethodCert.certificateData) && + Objects.equals(this.description, updateAuthMethodCert.description) && Objects.equals(this.forceSubClaims, updateAuthMethodCert.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodCert.gwBoundIps) && Objects.equals(this.json, updateAuthMethodCert.json) && @@ -680,7 +708,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, allowedCors, boundCommonNames, boundDnsSans, boundEmailSans, boundExtensions, boundIps, boundOrganizationalUnits, boundUriSans, certificateData, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, revokedCertIds, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, allowedCors, boundCommonNames, boundDnsSans, boundEmailSans, boundExtensions, boundIps, boundOrganizationalUnits, boundUriSans, certificateData, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, revokedCertIds, token, uidToken, uniqueIdentifier); } @Override @@ -697,6 +725,7 @@ public String toString() { sb.append(" boundOrganizationalUnits: ").append(toIndentedString(boundOrganizationalUnits)).append("\n"); sb.append(" boundUriSans: ").append(toIndentedString(boundUriSans)).append("\n"); sb.append(" certificateData: ").append(toIndentedString(certificateData)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodGCP.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodGCP.java index 0c5c9f22..812eb982 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodGCP.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodGCP.java @@ -64,6 +64,10 @@ public class UpdateAuthMethodGCP { @SerializedName(SERIALIZED_NAME_BOUND_ZONES) private List boundZones = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -339,6 +343,29 @@ public void setBoundZones(List boundZones) { } + public UpdateAuthMethodGCP description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodGCP forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -594,6 +621,7 @@ public boolean equals(Object o) { Objects.equals(this.boundRegions, updateAuthMethodGCP.boundRegions) && Objects.equals(this.boundServiceAccounts, updateAuthMethodGCP.boundServiceAccounts) && Objects.equals(this.boundZones, updateAuthMethodGCP.boundZones) && + Objects.equals(this.description, updateAuthMethodGCP.description) && Objects.equals(this.forceSubClaims, updateAuthMethodGCP.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodGCP.gwBoundIps) && Objects.equals(this.json, updateAuthMethodGCP.json) && @@ -608,7 +636,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundIps, boundLabels, boundProjects, boundRegions, boundServiceAccounts, boundZones, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, serviceAccountCredsData, token, type, uidToken); + return Objects.hash(accessExpires, audience, boundIps, boundLabels, boundProjects, boundRegions, boundServiceAccounts, boundZones, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, serviceAccountCredsData, token, type, uidToken); } @Override @@ -623,6 +651,7 @@ public String toString() { sb.append(" boundRegions: ").append(toIndentedString(boundRegions)).append("\n"); sb.append(" boundServiceAccounts: ").append(toIndentedString(boundServiceAccounts)).append("\n"); sb.append(" boundZones: ").append(toIndentedString(boundZones)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodK8S.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodK8S.java index 53ec257d..c0837836 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodK8S.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodK8S.java @@ -56,6 +56,10 @@ public class UpdateAuthMethodK8S { @SerializedName(SERIALIZED_NAME_BOUND_SA_NAMES) private List boundSaNames = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -269,6 +273,29 @@ public void setBoundSaNames(List boundSaNames) { } + public UpdateAuthMethodK8S description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodK8S forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -522,6 +549,7 @@ public boolean equals(Object o) { Objects.equals(this.boundNamespaces, updateAuthMethodK8S.boundNamespaces) && Objects.equals(this.boundPodNames, updateAuthMethodK8S.boundPodNames) && Objects.equals(this.boundSaNames, updateAuthMethodK8S.boundSaNames) && + Objects.equals(this.description, updateAuthMethodK8S.description) && Objects.equals(this.forceSubClaims, updateAuthMethodK8S.forceSubClaims) && Objects.equals(this.genKey, updateAuthMethodK8S.genKey) && Objects.equals(this.gwBoundIps, updateAuthMethodK8S.gwBoundIps) && @@ -536,7 +564,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundIps, boundNamespaces, boundPodNames, boundSaNames, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, newName, publicKey, token, uidToken); + return Objects.hash(accessExpires, audience, boundIps, boundNamespaces, boundPodNames, boundSaNames, description, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, newName, publicKey, token, uidToken); } @Override @@ -549,6 +577,7 @@ public String toString() { sb.append(" boundNamespaces: ").append(toIndentedString(boundNamespaces)).append("\n"); sb.append(" boundPodNames: ").append(toIndentedString(boundPodNames)).append("\n"); sb.append(" boundSaNames: ").append(toIndentedString(boundSaNames)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" genKey: ").append(toIndentedString(genKey)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodLDAP.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodLDAP.java index 4209b2fc..737b99e0 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodLDAP.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodLDAP.java @@ -40,6 +40,10 @@ public class UpdateAuthMethodLDAP { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -141,6 +145,29 @@ public void setBoundIps(List boundIps) { } + public UpdateAuthMethodLDAP description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodLDAP forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -413,6 +440,7 @@ public boolean equals(Object o) { UpdateAuthMethodLDAP updateAuthMethodLDAP = (UpdateAuthMethodLDAP) o; return Objects.equals(this.accessExpires, updateAuthMethodLDAP.accessExpires) && Objects.equals(this.boundIps, updateAuthMethodLDAP.boundIps) && + Objects.equals(this.description, updateAuthMethodLDAP.description) && Objects.equals(this.forceSubClaims, updateAuthMethodLDAP.forceSubClaims) && Objects.equals(this.genKey, updateAuthMethodLDAP.genKey) && Objects.equals(this.gwBoundIps, updateAuthMethodLDAP.gwBoundIps) && @@ -428,7 +456,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, newName, publicKeyData, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, boundIps, description, forceSubClaims, genKey, gwBoundIps, json, jwtTtl, name, newName, publicKeyData, token, uidToken, uniqueIdentifier); } @Override @@ -437,6 +465,7 @@ public String toString() { sb.append("class UpdateAuthMethodLDAP {\n"); sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" genKey: ").append(toIndentedString(genKey)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodOAuth2.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodOAuth2.java index 4576da41..36de9edf 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodOAuth2.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodOAuth2.java @@ -48,6 +48,10 @@ public class UpdateAuthMethodOAuth2 { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -215,6 +219,29 @@ public void setBoundIps(List boundIps) { } + public UpdateAuthMethodOAuth2 description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodOAuth2 forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -566,6 +593,7 @@ public boolean equals(Object o) { Objects.equals(this.audience, updateAuthMethodOAuth2.audience) && Objects.equals(this.boundClientIds, updateAuthMethodOAuth2.boundClientIds) && Objects.equals(this.boundIps, updateAuthMethodOAuth2.boundIps) && + Objects.equals(this.description, updateAuthMethodOAuth2.description) && Objects.equals(this.forceSubClaims, updateAuthMethodOAuth2.forceSubClaims) && Objects.equals(this.gatewayUrl, updateAuthMethodOAuth2.gatewayUrl) && Objects.equals(this.gwBoundIps, updateAuthMethodOAuth2.gwBoundIps) && @@ -584,7 +612,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, audience, boundClientIds, boundIps, forceSubClaims, gatewayUrl, gwBoundIps, issuer, json, jwksJsonData, jwksUri, jwtTtl, name, newName, subclaimsDelimiters, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, audience, boundClientIds, boundIps, description, forceSubClaims, gatewayUrl, gwBoundIps, issuer, json, jwksJsonData, jwksUri, jwtTtl, name, newName, subclaimsDelimiters, token, uidToken, uniqueIdentifier); } @Override @@ -595,6 +623,7 @@ public String toString() { sb.append(" audience: ").append(toIndentedString(audience)).append("\n"); sb.append(" boundClientIds: ").append(toIndentedString(boundClientIds)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gatewayUrl: ").append(toIndentedString(gatewayUrl)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodOIDC.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodOIDC.java index 40e76f22..9e457341 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodOIDC.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodOIDC.java @@ -56,6 +56,10 @@ public class UpdateAuthMethodOIDC { @SerializedName(SERIALIZED_NAME_CLIENT_SECRET) private String clientSecret; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -265,6 +269,29 @@ public void setClientSecret(String clientSecret) { } + public UpdateAuthMethodOIDC description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodOIDC forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -603,6 +630,7 @@ public boolean equals(Object o) { Objects.equals(this.boundIps, updateAuthMethodOIDC.boundIps) && Objects.equals(this.clientId, updateAuthMethodOIDC.clientId) && Objects.equals(this.clientSecret, updateAuthMethodOIDC.clientSecret) && + Objects.equals(this.description, updateAuthMethodOIDC.description) && Objects.equals(this.forceSubClaims, updateAuthMethodOIDC.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodOIDC.gwBoundIps) && Objects.equals(this.issuer, updateAuthMethodOIDC.issuer) && @@ -620,7 +648,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, allowedRedirectUri, audience, boundIps, clientId, clientSecret, forceSubClaims, gwBoundIps, issuer, json, jwtTtl, name, newName, requiredScopes, requiredScopesPrefix, subclaimsDelimiters, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, allowedRedirectUri, audience, boundIps, clientId, clientSecret, description, forceSubClaims, gwBoundIps, issuer, json, jwtTtl, name, newName, requiredScopes, requiredScopesPrefix, subclaimsDelimiters, token, uidToken, uniqueIdentifier); } @Override @@ -633,6 +661,7 @@ public String toString() { sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); sb.append(" clientId: ").append(toIndentedString(clientId)).append("\n"); sb.append(" clientSecret: ").append(toIndentedString(clientSecret)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" issuer: ").append(toIndentedString(issuer)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodSAML.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodSAML.java index 60de0266..c1cfb11d 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodSAML.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodSAML.java @@ -44,6 +44,10 @@ public class UpdateAuthMethodSAML { @SerializedName(SERIALIZED_NAME_BOUND_IPS) private List boundIps = null; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -180,6 +184,29 @@ public void setBoundIps(List boundIps) { } + public UpdateAuthMethodSAML description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodSAML forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -484,6 +511,7 @@ public boolean equals(Object o) { return Objects.equals(this.accessExpires, updateAuthMethodSAML.accessExpires) && Objects.equals(this.allowedRedirectUri, updateAuthMethodSAML.allowedRedirectUri) && Objects.equals(this.boundIps, updateAuthMethodSAML.boundIps) && + Objects.equals(this.description, updateAuthMethodSAML.description) && Objects.equals(this.forceSubClaims, updateAuthMethodSAML.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodSAML.gwBoundIps) && Objects.equals(this.idpMetadataUrl, updateAuthMethodSAML.idpMetadataUrl) && @@ -500,7 +528,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, allowedRedirectUri, boundIps, forceSubClaims, gwBoundIps, idpMetadataUrl, idpMetadataXmlData, json, jwtTtl, name, newName, subclaimsDelimiters, token, uidToken, uniqueIdentifier); + return Objects.hash(accessExpires, allowedRedirectUri, boundIps, description, forceSubClaims, gwBoundIps, idpMetadataUrl, idpMetadataXmlData, json, jwtTtl, name, newName, subclaimsDelimiters, token, uidToken, uniqueIdentifier); } @Override @@ -510,6 +538,7 @@ public String toString() { sb.append(" accessExpires: ").append(toIndentedString(accessExpires)).append("\n"); sb.append(" allowedRedirectUri: ").append(toIndentedString(allowedRedirectUri)).append("\n"); sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" idpMetadataUrl: ").append(toIndentedString(idpMetadataUrl)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateAuthMethodUniversalIdentity.java b/src/main/java/io/akeyless/client/model/UpdateAuthMethodUniversalIdentity.java index b9bcb585..b11eca69 100644 --- a/src/main/java/io/akeyless/client/model/UpdateAuthMethodUniversalIdentity.java +++ b/src/main/java/io/akeyless/client/model/UpdateAuthMethodUniversalIdentity.java @@ -48,6 +48,10 @@ public class UpdateAuthMethodUniversalIdentity { @SerializedName(SERIALIZED_NAME_DENY_ROTATE) private Boolean denyRotate; + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + public static final String SERIALIZED_NAME_FORCE_SUB_CLAIMS = "force-sub-claims"; @SerializedName(SERIALIZED_NAME_FORCE_SUB_CLAIMS) private Boolean forceSubClaims; @@ -187,6 +191,29 @@ public void setDenyRotate(Boolean denyRotate) { } + public UpdateAuthMethodUniversalIdentity description(String description) { + + this.description = description; + return this; + } + + /** + * Auth Method description + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Auth Method description") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + public UpdateAuthMethodUniversalIdentity forceSubClaims(Boolean forceSubClaims) { this.forceSubClaims = forceSubClaims; @@ -415,6 +442,7 @@ public boolean equals(Object o) { Objects.equals(this.boundIps, updateAuthMethodUniversalIdentity.boundIps) && Objects.equals(this.denyInheritance, updateAuthMethodUniversalIdentity.denyInheritance) && Objects.equals(this.denyRotate, updateAuthMethodUniversalIdentity.denyRotate) && + Objects.equals(this.description, updateAuthMethodUniversalIdentity.description) && Objects.equals(this.forceSubClaims, updateAuthMethodUniversalIdentity.forceSubClaims) && Objects.equals(this.gwBoundIps, updateAuthMethodUniversalIdentity.gwBoundIps) && Objects.equals(this.json, updateAuthMethodUniversalIdentity.json) && @@ -428,7 +456,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessExpires, boundIps, denyInheritance, denyRotate, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, token, ttl, uidToken); + return Objects.hash(accessExpires, boundIps, denyInheritance, denyRotate, description, forceSubClaims, gwBoundIps, json, jwtTtl, name, newName, token, ttl, uidToken); } @Override @@ -439,6 +467,7 @@ public String toString() { sb.append(" boundIps: ").append(toIndentedString(boundIps)).append("\n"); sb.append(" denyInheritance: ").append(toIndentedString(denyInheritance)).append("\n"); sb.append(" denyRotate: ").append(toIndentedString(denyRotate)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" forceSubClaims: ").append(toIndentedString(forceSubClaims)).append("\n"); sb.append(" gwBoundIps: ").append(toIndentedString(gwBoundIps)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateCertificateValue.java b/src/main/java/io/akeyless/client/model/UpdateCertificateValue.java index d4878b69..42883275 100644 --- a/src/main/java/io/akeyless/client/model/UpdateCertificateValue.java +++ b/src/main/java/io/akeyless/client/model/UpdateCertificateValue.java @@ -59,6 +59,10 @@ public class UpdateCertificateValue { @SerializedName(SERIALIZED_NAME_JSON) private Boolean json = false; + public static final String SERIALIZED_NAME_KEEP_PREV_VERSION = "keep-prev-version"; + @SerializedName(SERIALIZED_NAME_KEEP_PREV_VERSION) + private String keepPrevVersion; + public static final String SERIALIZED_NAME_KEY = "key"; @SerializedName(SERIALIZED_NAME_KEY) private String key; @@ -267,6 +271,29 @@ public void setJson(Boolean json) { } + public UpdateCertificateValue keepPrevVersion(String keepPrevVersion) { + + this.keepPrevVersion = keepPrevVersion; + return this; + } + + /** + * Whether to keep previous version [true/false]. If not set, use default according to account settings + * @return keepPrevVersion + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Whether to keep previous version [true/false]. If not set, use default according to account settings") + + public String getKeepPrevVersion() { + return keepPrevVersion; + } + + + public void setKeepPrevVersion(String keepPrevVersion) { + this.keepPrevVersion = keepPrevVersion; + } + + public UpdateCertificateValue key(String key) { this.key = key; @@ -452,6 +479,7 @@ public boolean equals(Object o) { Objects.equals(this.expirationEventIn, updateCertificateValue.expirationEventIn) && Objects.equals(this.format, updateCertificateValue.format) && Objects.equals(this.json, updateCertificateValue.json) && + Objects.equals(this.keepPrevVersion, updateCertificateValue.keepPrevVersion) && Objects.equals(this.key, updateCertificateValue.key) && Objects.equals(this.keyData, updateCertificateValue.keyData) && Objects.equals(this.metadata, updateCertificateValue.metadata) && @@ -463,7 +491,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(addTag, certificateData, deleteProtection, description, expirationEventIn, format, json, key, keyData, metadata, name, rmTag, token, uidToken); + return Objects.hash(addTag, certificateData, deleteProtection, description, expirationEventIn, format, json, keepPrevVersion, key, keyData, metadata, name, rmTag, token, uidToken); } @Override @@ -477,6 +505,7 @@ public String toString() { sb.append(" expirationEventIn: ").append(toIndentedString(expirationEventIn)).append("\n"); sb.append(" format: ").append(toIndentedString(format)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" keepPrevVersion: ").append(toIndentedString(keepPrevVersion)).append("\n"); sb.append(" key: ").append(toIndentedString(key)).append("\n"); sb.append(" keyData: ").append(toIndentedString(keyData)).append("\n"); sb.append(" metadata: ").append(toIndentedString(metadata)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateItem.java b/src/main/java/io/akeyless/client/model/UpdateItem.java index 53d70312..f24fa782 100644 --- a/src/main/java/io/akeyless/client/model/UpdateItem.java +++ b/src/main/java/io/akeyless/client/model/UpdateItem.java @@ -31,6 +31,10 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class UpdateItem { + public static final String SERIALIZED_NAME_PROVIDER_TYPE = "ProviderType"; + @SerializedName(SERIALIZED_NAME_PROVIDER_TYPE) + private String providerType; + public static final String SERIALIZED_NAME_ACCESSIBILITY = "accessibility"; @SerializedName(SERIALIZED_NAME_ACCESSIBILITY) private String accessibility = "regular"; @@ -43,6 +47,10 @@ public class UpdateItem { @SerializedName(SERIALIZED_NAME_CERT_FILE_DATA) private String certFileData; + public static final String SERIALIZED_NAME_CHANGE_EVENT = "change-event"; + @SerializedName(SERIALIZED_NAME_CHANGE_EVENT) + private String changeEvent; + public static final String SERIALIZED_NAME_DELETE_PROTECTION = "delete_protection"; @SerializedName(SERIALIZED_NAME_DELETE_PROTECTION) private String deleteProtection; @@ -51,6 +59,10 @@ public class UpdateItem { @SerializedName(SERIALIZED_NAME_DESCRIPTION) private String description = "default_metadata"; + public static final String SERIALIZED_NAME_HOST_PROVIDER = "host-provider"; + @SerializedName(SERIALIZED_NAME_HOST_PROVIDER) + private String hostProvider = "explicit"; + public static final String SERIALIZED_NAME_JSON = "json"; @SerializedName(SERIALIZED_NAME_JSON) private Boolean json = false; @@ -186,6 +198,29 @@ public class UpdateItem { public UpdateItem() { } + public UpdateItem providerType(String providerType) { + + this.providerType = providerType; + return this; + } + + /** + * Get providerType + * @return providerType + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getProviderType() { + return providerType; + } + + + public void setProviderType(String providerType) { + this.providerType = providerType; + } + + public UpdateItem accessibility(String accessibility) { this.accessibility = accessibility; @@ -263,6 +298,29 @@ public void setCertFileData(String certFileData) { } + public UpdateItem changeEvent(String changeEvent) { + + this.changeEvent = changeEvent; + return this; + } + + /** + * Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) + * @return changeEvent + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret)") + + public String getChangeEvent() { + return changeEvent; + } + + + public void setChangeEvent(String changeEvent) { + this.changeEvent = changeEvent; + } + + public UpdateItem deleteProtection(String deleteProtection) { this.deleteProtection = deleteProtection; @@ -309,6 +367,29 @@ public void setDescription(String description) { } + public UpdateItem hostProvider(String hostProvider) { + + this.hostProvider = hostProvider; + return this; + } + + /** + * Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret + * @return hostProvider + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret") + + public String getHostProvider() { + return hostProvider; + } + + + public void setHostProvider(String hostProvider) { + this.hostProvider = hostProvider; + } + + public UpdateItem json(Boolean json) { this.json = json; @@ -1109,11 +1190,14 @@ public boolean equals(Object o) { return false; } UpdateItem updateItem = (UpdateItem) o; - return Objects.equals(this.accessibility, updateItem.accessibility) && + return Objects.equals(this.providerType, updateItem.providerType) && + Objects.equals(this.accessibility, updateItem.accessibility) && Objects.equals(this.addTag, updateItem.addTag) && Objects.equals(this.certFileData, updateItem.certFileData) && + Objects.equals(this.changeEvent, updateItem.changeEvent) && Objects.equals(this.deleteProtection, updateItem.deleteProtection) && Objects.equals(this.description, updateItem.description) && + Objects.equals(this.hostProvider, updateItem.hostProvider) && Objects.equals(this.json, updateItem.json) && Objects.equals(this.name, updateItem.name) && Objects.equals(this.newMetadata, updateItem.newMetadata) && @@ -1151,18 +1235,21 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessibility, addTag, certFileData, deleteProtection, description, json, name, newMetadata, newName, rmTag, rotateAfterDisconnect, secureAccessAddHost, secureAccessAllowExternalUser, secureAccessAllowPortForwading, secureAccessAwsAccountId, secureAccessAwsNativeCli, secureAccessAwsRegion, secureAccessBastionApi, secureAccessBastionIssuer, secureAccessBastionSsh, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessDbName, secureAccessDbSchema, secureAccessEnable, secureAccessHost, secureAccessRdGatewayServer, secureAccessRdpDomain, secureAccessRdpUser, secureAccessRmHost, secureAccessSshCreds, secureAccessSshCredsUser, secureAccessUrl, secureAccessUseInternalBastion, secureAccessWebBrowsing, secureAccessWebProxy, token, uidToken); + return Objects.hash(providerType, accessibility, addTag, certFileData, changeEvent, deleteProtection, description, hostProvider, json, name, newMetadata, newName, rmTag, rotateAfterDisconnect, secureAccessAddHost, secureAccessAllowExternalUser, secureAccessAllowPortForwading, secureAccessAwsAccountId, secureAccessAwsNativeCli, secureAccessAwsRegion, secureAccessBastionApi, secureAccessBastionIssuer, secureAccessBastionSsh, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessDbName, secureAccessDbSchema, secureAccessEnable, secureAccessHost, secureAccessRdGatewayServer, secureAccessRdpDomain, secureAccessRdpUser, secureAccessRmHost, secureAccessSshCreds, secureAccessSshCredsUser, secureAccessUrl, secureAccessUseInternalBastion, secureAccessWebBrowsing, secureAccessWebProxy, token, uidToken); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class UpdateItem {\n"); + sb.append(" providerType: ").append(toIndentedString(providerType)).append("\n"); sb.append(" accessibility: ").append(toIndentedString(accessibility)).append("\n"); sb.append(" addTag: ").append(toIndentedString(addTag)).append("\n"); sb.append(" certFileData: ").append(toIndentedString(certFileData)).append("\n"); + sb.append(" changeEvent: ").append(toIndentedString(changeEvent)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); + sb.append(" hostProvider: ").append(toIndentedString(hostProvider)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" newMetadata: ").append(toIndentedString(newMetadata)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateLinkedTarget.java b/src/main/java/io/akeyless/client/model/UpdateLinkedTarget.java index 8dcdd5e6..208e2cf5 100644 --- a/src/main/java/io/akeyless/client/model/UpdateLinkedTarget.java +++ b/src/main/java/io/akeyless/client/model/UpdateLinkedTarget.java @@ -69,6 +69,10 @@ public class UpdateLinkedTarget { @SerializedName(SERIALIZED_NAME_TOKEN) private String token; + public static final String SERIALIZED_NAME_TYPE = "type"; + @SerializedName(SERIALIZED_NAME_TYPE) + private String type; + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; @@ -306,6 +310,29 @@ public void setToken(String token) { } + public UpdateLinkedTarget type(String type) { + + this.type = type; + return this; + } + + /** + * Specifies the hosts type, relevant only when working without parent target + * @return type + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Specifies the hosts type, relevant only when working without parent target") + + public String getType() { + return type; + } + + + public void setType(String type) { + this.type = type; + } + + public UpdateLinkedTarget uidToken(String uidToken) { this.uidToken = uidToken; @@ -348,12 +375,13 @@ public boolean equals(Object o) { Objects.equals(this.parentTargetName, updateLinkedTarget.parentTargetName) && Objects.equals(this.rmHosts, updateLinkedTarget.rmHosts) && Objects.equals(this.token, updateLinkedTarget.token) && + Objects.equals(this.type, updateLinkedTarget.type) && Objects.equals(this.uidToken, updateLinkedTarget.uidToken); } @Override public int hashCode() { - return Objects.hash(addHosts, description, hosts, json, keepPrevVersion, name, newName, parentTargetName, rmHosts, token, uidToken); + return Objects.hash(addHosts, description, hosts, json, keepPrevVersion, name, newName, parentTargetName, rmHosts, token, type, uidToken); } @Override @@ -370,6 +398,7 @@ public String toString() { sb.append(" parentTargetName: ").append(toIndentedString(parentTargetName)).append("\n"); sb.append(" rmHosts: ").append(toIndentedString(rmHosts)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" type: ").append(toIndentedString(type)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); sb.append("}"); return sb.toString(); diff --git a/src/main/java/io/akeyless/client/model/UpdateRole.java b/src/main/java/io/akeyless/client/model/UpdateRole.java index cc0ba07a..93ed0911 100644 --- a/src/main/java/io/akeyless/client/model/UpdateRole.java +++ b/src/main/java/io/akeyless/client/model/UpdateRole.java @@ -41,6 +41,14 @@ public class UpdateRole { @SerializedName(SERIALIZED_NAME_DESCRIPTION) private String description = "default_comment"; + public static final String SERIALIZED_NAME_EVENT_CENTER_ACCESS = "event-center-access"; + @SerializedName(SERIALIZED_NAME_EVENT_CENTER_ACCESS) + private String eventCenterAccess; + + public static final String SERIALIZED_NAME_EVENT_FORWARDER_ACCESS = "event-forwarder-access"; + @SerializedName(SERIALIZED_NAME_EVENT_FORWARDER_ACCESS) + private String eventForwarderAccess; + public static final String SERIALIZED_NAME_GW_ANALYTICS_ACCESS = "gw-analytics-access"; @SerializedName(SERIALIZED_NAME_GW_ANALYTICS_ACCESS) private String gwAnalyticsAccess; @@ -149,6 +157,52 @@ public void setDescription(String description) { } + public UpdateRole eventCenterAccess(String eventCenterAccess) { + + this.eventCenterAccess = eventCenterAccess; + return this; + } + + /** + * Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported + * @return eventCenterAccess + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported") + + public String getEventCenterAccess() { + return eventCenterAccess; + } + + + public void setEventCenterAccess(String eventCenterAccess) { + this.eventCenterAccess = eventCenterAccess; + } + + + public UpdateRole eventForwarderAccess(String eventForwarderAccess) { + + this.eventForwarderAccess = eventForwarderAccess; + return this; + } + + /** + * Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. + * @return eventForwarderAccess + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported.") + + public String getEventForwarderAccess() { + return eventForwarderAccess; + } + + + public void setEventForwarderAccess(String eventForwarderAccess) { + this.eventForwarderAccess = eventForwarderAccess; + } + + public UpdateRole gwAnalyticsAccess(String gwAnalyticsAccess) { this.gwAnalyticsAccess = gwAnalyticsAccess; @@ -368,6 +422,8 @@ public boolean equals(Object o) { return Objects.equals(this.analyticsAccess, updateRole.analyticsAccess) && Objects.equals(this.auditAccess, updateRole.auditAccess) && Objects.equals(this.description, updateRole.description) && + Objects.equals(this.eventCenterAccess, updateRole.eventCenterAccess) && + Objects.equals(this.eventForwarderAccess, updateRole.eventForwarderAccess) && Objects.equals(this.gwAnalyticsAccess, updateRole.gwAnalyticsAccess) && Objects.equals(this.json, updateRole.json) && Objects.equals(this.name, updateRole.name) && @@ -381,7 +437,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(analyticsAccess, auditAccess, description, gwAnalyticsAccess, json, name, newComment, newName, sraReportsAccess, token, uidToken, usageReportsAccess); + return Objects.hash(analyticsAccess, auditAccess, description, eventCenterAccess, eventForwarderAccess, gwAnalyticsAccess, json, name, newComment, newName, sraReportsAccess, token, uidToken, usageReportsAccess); } @Override @@ -391,6 +447,8 @@ public String toString() { sb.append(" analyticsAccess: ").append(toIndentedString(analyticsAccess)).append("\n"); sb.append(" auditAccess: ").append(toIndentedString(auditAccess)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); + sb.append(" eventCenterAccess: ").append(toIndentedString(eventCenterAccess)).append("\n"); + sb.append(" eventForwarderAccess: ").append(toIndentedString(eventForwarderAccess)).append("\n"); sb.append(" gwAnalyticsAccess: ").append(toIndentedString(gwAnalyticsAccess)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateSSHCertIssuer.java b/src/main/java/io/akeyless/client/model/UpdateSSHCertIssuer.java index 0922d04b..80cacdec 100644 --- a/src/main/java/io/akeyless/client/model/UpdateSSHCertIssuer.java +++ b/src/main/java/io/akeyless/client/model/UpdateSSHCertIssuer.java @@ -33,9 +33,9 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class UpdateSSHCertIssuer { - public static final String SERIALIZED_NAME_SSH_CERT_ISSUER_HOST_PROVIDER = "SshCertIssuerHostProvider"; - @SerializedName(SERIALIZED_NAME_SSH_CERT_ISSUER_HOST_PROVIDER) - private String sshCertIssuerHostProvider; + public static final String SERIALIZED_NAME_PROVIDER_TYPE = "ProviderType"; + @SerializedName(SERIALIZED_NAME_PROVIDER_TYPE) + private String providerType; public static final String SERIALIZED_NAME_ADD_TAG = "add-tag"; @SerializedName(SERIALIZED_NAME_ADD_TAG) @@ -128,26 +128,26 @@ public class UpdateSSHCertIssuer { public UpdateSSHCertIssuer() { } - public UpdateSSHCertIssuer sshCertIssuerHostProvider(String sshCertIssuerHostProvider) { + public UpdateSSHCertIssuer providerType(String providerType) { - this.sshCertIssuerHostProvider = sshCertIssuerHostProvider; + this.providerType = providerType; return this; } /** - * Get sshCertIssuerHostProvider - * @return sshCertIssuerHostProvider + * Get providerType + * @return providerType **/ @javax.annotation.Nullable @ApiModelProperty(value = "") - public String getSshCertIssuerHostProvider() { - return sshCertIssuerHostProvider; + public String getProviderType() { + return providerType; } - public void setSshCertIssuerHostProvider(String sshCertIssuerHostProvider) { - this.sshCertIssuerHostProvider = sshCertIssuerHostProvider; + public void setProviderType(String providerType) { + this.providerType = providerType; } @@ -289,11 +289,11 @@ public UpdateSSHCertIssuer hostProvider(String hostProvider) { } /** - * Host provider type [explicit/target] + * Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret * @return hostProvider **/ @javax.annotation.Nullable - @ApiModelProperty(value = "Host provider type [explicit/target]") + @ApiModelProperty(value = "Host provider type [explicit/target], Relevant only for Secure Remote Access of ssh cert issuer and ldap rotated secret") public String getHostProvider() { return hostProvider; @@ -698,7 +698,7 @@ public boolean equals(Object o) { return false; } UpdateSSHCertIssuer updateSSHCertIssuer = (UpdateSSHCertIssuer) o; - return Objects.equals(this.sshCertIssuerHostProvider, updateSSHCertIssuer.sshCertIssuerHostProvider) && + return Objects.equals(this.providerType, updateSSHCertIssuer.providerType) && Objects.equals(this.addTag, updateSSHCertIssuer.addTag) && Objects.equals(this.allowedUsers, updateSSHCertIssuer.allowedUsers) && Objects.equals(this.deleteProtection, updateSSHCertIssuer.deleteProtection) && @@ -725,14 +725,14 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(sshCertIssuerHostProvider, addTag, allowedUsers, deleteProtection, description, extensions, hostProvider, json, metadata, name, newName, principals, rmTag, secureAccessBastionApi, secureAccessBastionSsh, secureAccessEnable, secureAccessHost, secureAccessSshCredsUser, secureAccessUseInternalBastion, signerKeyName, token, ttl, uidToken); + return Objects.hash(providerType, addTag, allowedUsers, deleteProtection, description, extensions, hostProvider, json, metadata, name, newName, principals, rmTag, secureAccessBastionApi, secureAccessBastionSsh, secureAccessEnable, secureAccessHost, secureAccessSshCredsUser, secureAccessUseInternalBastion, signerKeyName, token, ttl, uidToken); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class UpdateSSHCertIssuer {\n"); - sb.append(" sshCertIssuerHostProvider: ").append(toIndentedString(sshCertIssuerHostProvider)).append("\n"); + sb.append(" providerType: ").append(toIndentedString(providerType)).append("\n"); sb.append(" addTag: ").append(toIndentedString(addTag)).append("\n"); sb.append(" allowedUsers: ").append(toIndentedString(allowedUsers)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateSecretVal.java b/src/main/java/io/akeyless/client/model/UpdateSecretVal.java index fe3a7baa..1c6bd6ab 100644 --- a/src/main/java/io/akeyless/client/model/UpdateSecretVal.java +++ b/src/main/java/io/akeyless/client/model/UpdateSecretVal.java @@ -57,6 +57,10 @@ public class UpdateSecretVal { @SerializedName(SERIALIZED_NAME_KEY) private String key; + public static final String SERIALIZED_NAME_LAST_VERSION = "last-version"; + @SerializedName(SERIALIZED_NAME_LAST_VERSION) + private Integer lastVersion; + public static final String SERIALIZED_NAME_MULTILINE = "multiline"; @SerializedName(SERIALIZED_NAME_MULTILINE) private Boolean multiline; @@ -246,6 +250,29 @@ public void setKey(String key) { } + public UpdateSecretVal lastVersion(Integer lastVersion) { + + this.lastVersion = lastVersion; + return this; + } + + /** + * The last version number before the update + * @return lastVersion + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The last version number before the update") + + public Integer getLastVersion() { + return lastVersion; + } + + + public void setLastVersion(Integer lastVersion) { + this.lastVersion = lastVersion; + } + + public UpdateSecretVal multiline(Boolean multiline) { this.multiline = multiline; @@ -445,6 +472,7 @@ public boolean equals(Object o) { Objects.equals(this.json, updateSecretVal.json) && Objects.equals(this.keepPrevVersion, updateSecretVal.keepPrevVersion) && Objects.equals(this.key, updateSecretVal.key) && + Objects.equals(this.lastVersion, updateSecretVal.lastVersion) && Objects.equals(this.multiline, updateSecretVal.multiline) && Objects.equals(this.name, updateSecretVal.name) && Objects.equals(this.newVersion, updateSecretVal.newVersion) && @@ -457,7 +485,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessibility, customField, injectUrl, json, keepPrevVersion, key, multiline, name, newVersion, password, token, uidToken, username, value); + return Objects.hash(accessibility, customField, injectUrl, json, keepPrevVersion, key, lastVersion, multiline, name, newVersion, password, token, uidToken, username, value); } @Override @@ -470,6 +498,7 @@ public String toString() { sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keepPrevVersion: ").append(toIndentedString(keepPrevVersion)).append("\n"); sb.append(" key: ").append(toIndentedString(key)).append("\n"); + sb.append(" lastVersion: ").append(toIndentedString(lastVersion)).append("\n"); sb.append(" multiline: ").append(toIndentedString(multiline)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" newVersion: ").append(toIndentedString(newVersion)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/VerifyEcDsa.java b/src/main/java/io/akeyless/client/model/VerifyEcDsa.java index c92cedee..2e33e453 100644 --- a/src/main/java/io/akeyless/client/model/VerifyEcDsa.java +++ b/src/main/java/io/akeyless/client/model/VerifyEcDsa.java @@ -50,6 +50,10 @@ public class VerifyEcDsa { @SerializedName(SERIALIZED_NAME_MESSAGE) private String message; + public static final String SERIALIZED_NAME_PREHASHED = "prehashed"; + @SerializedName(SERIALIZED_NAME_PREHASHED) + private Boolean prehashed; + public static final String SERIALIZED_NAME_SIGNATURE = "signature"; @SerializedName(SERIALIZED_NAME_SIGNATURE) private String signature; @@ -62,6 +66,10 @@ public class VerifyEcDsa { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_VERSION = "version"; + @SerializedName(SERIALIZED_NAME_VERSION) + private Integer version; + public VerifyEcDsa() { } @@ -180,6 +188,29 @@ public void setMessage(String message) { } + public VerifyEcDsa prehashed(Boolean prehashed) { + + this.prehashed = prehashed; + return this; + } + + /** + * Markes that the message is already hashed + * @return prehashed + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Markes that the message is already hashed") + + public Boolean getPrehashed() { + return prehashed; + } + + + public void setPrehashed(Boolean prehashed) { + this.prehashed = prehashed; + } + + public VerifyEcDsa signature(String signature) { this.signature = signature; @@ -249,6 +280,29 @@ public void setUidToken(String uidToken) { } + public VerifyEcDsa version(Integer version) { + + this.version = version; + return this; + } + + /** + * The version of the key to use for verification + * @return version + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The version of the key to use for verification") + + public Integer getVersion() { + return version; + } + + + public void setVersion(Integer version) { + this.version = version; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -263,14 +317,16 @@ public boolean equals(Object o) { Objects.equals(this.json, verifyEcDsa.json) && Objects.equals(this.keyName, verifyEcDsa.keyName) && Objects.equals(this.message, verifyEcDsa.message) && + Objects.equals(this.prehashed, verifyEcDsa.prehashed) && Objects.equals(this.signature, verifyEcDsa.signature) && Objects.equals(this.token, verifyEcDsa.token) && - Objects.equals(this.uidToken, verifyEcDsa.uidToken); + Objects.equals(this.uidToken, verifyEcDsa.uidToken) && + Objects.equals(this.version, verifyEcDsa.version); } @Override public int hashCode() { - return Objects.hash(displayId, itemId, json, keyName, message, signature, token, uidToken); + return Objects.hash(displayId, itemId, json, keyName, message, prehashed, signature, token, uidToken, version); } @Override @@ -282,9 +338,11 @@ public String toString() { sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyName: ").append(toIndentedString(keyName)).append("\n"); sb.append(" message: ").append(toIndentedString(message)).append("\n"); + sb.append(" prehashed: ").append(toIndentedString(prehashed)).append("\n"); sb.append(" signature: ").append(toIndentedString(signature)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/VerifyPKCS1.java b/src/main/java/io/akeyless/client/model/VerifyPKCS1.java index e0fcd5c3..1c2947ea 100644 --- a/src/main/java/io/akeyless/client/model/VerifyPKCS1.java +++ b/src/main/java/io/akeyless/client/model/VerifyPKCS1.java @@ -33,6 +33,14 @@ public class VerifyPKCS1 { @SerializedName(SERIALIZED_NAME_DISPLAY_ID) private String displayId; + public static final String SERIALIZED_NAME_HASH_FUNCTION = "hash-function"; + @SerializedName(SERIALIZED_NAME_HASH_FUNCTION) + private String hashFunction; + + public static final String SERIALIZED_NAME_INPUT_FORMAT = "input-format"; + @SerializedName(SERIALIZED_NAME_INPUT_FORMAT) + private String inputFormat; + public static final String SERIALIZED_NAME_ITEM_ID = "item-id"; @SerializedName(SERIALIZED_NAME_ITEM_ID) private Long itemId; @@ -49,6 +57,10 @@ public class VerifyPKCS1 { @SerializedName(SERIALIZED_NAME_MESSAGE) private String message; + public static final String SERIALIZED_NAME_PREHASHED = "prehashed"; + @SerializedName(SERIALIZED_NAME_PREHASHED) + private Boolean prehashed; + public static final String SERIALIZED_NAME_SIGNATURE = "signature"; @SerializedName(SERIALIZED_NAME_SIGNATURE) private String signature; @@ -61,6 +73,10 @@ public class VerifyPKCS1 { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_VERSION = "version"; + @SerializedName(SERIALIZED_NAME_VERSION) + private Integer version; + public VerifyPKCS1() { } @@ -87,6 +103,52 @@ public void setDisplayId(String displayId) { } + public VerifyPKCS1 hashFunction(String hashFunction) { + + this.hashFunction = hashFunction; + return this; + } + + /** + * HashFunction defines the hash function (e.g. sha-256) + * @return hashFunction + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "HashFunction defines the hash function (e.g. sha-256)") + + public String getHashFunction() { + return hashFunction; + } + + + public void setHashFunction(String hashFunction) { + this.hashFunction = hashFunction; + } + + + public VerifyPKCS1 inputFormat(String inputFormat) { + + this.inputFormat = inputFormat; + return this; + } + + /** + * Select default assumed format for the plaintext message. Currently supported options: [base64] + * @return inputFormat + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Select default assumed format for the plaintext message. Currently supported options: [base64]") + + public String getInputFormat() { + return inputFormat; + } + + + public void setInputFormat(String inputFormat) { + this.inputFormat = inputFormat; + } + + public VerifyPKCS1 itemId(Long itemId) { this.itemId = itemId; @@ -179,6 +241,29 @@ public void setMessage(String message) { } + public VerifyPKCS1 prehashed(Boolean prehashed) { + + this.prehashed = prehashed; + return this; + } + + /** + * Markes that the message is already hashed + * @return prehashed + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Markes that the message is already hashed") + + public Boolean getPrehashed() { + return prehashed; + } + + + public void setPrehashed(Boolean prehashed) { + this.prehashed = prehashed; + } + + public VerifyPKCS1 signature(String signature) { this.signature = signature; @@ -248,6 +333,29 @@ public void setUidToken(String uidToken) { } + public VerifyPKCS1 version(Integer version) { + + this.version = version; + return this; + } + + /** + * The version of the key to use for verification + * @return version + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The version of the key to use for verification") + + public Integer getVersion() { + return version; + } + + + public void setVersion(Integer version) { + this.version = version; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -258,18 +366,22 @@ public boolean equals(Object o) { } VerifyPKCS1 verifyPKCS1 = (VerifyPKCS1) o; return Objects.equals(this.displayId, verifyPKCS1.displayId) && + Objects.equals(this.hashFunction, verifyPKCS1.hashFunction) && + Objects.equals(this.inputFormat, verifyPKCS1.inputFormat) && Objects.equals(this.itemId, verifyPKCS1.itemId) && Objects.equals(this.json, verifyPKCS1.json) && Objects.equals(this.keyName, verifyPKCS1.keyName) && Objects.equals(this.message, verifyPKCS1.message) && + Objects.equals(this.prehashed, verifyPKCS1.prehashed) && Objects.equals(this.signature, verifyPKCS1.signature) && Objects.equals(this.token, verifyPKCS1.token) && - Objects.equals(this.uidToken, verifyPKCS1.uidToken); + Objects.equals(this.uidToken, verifyPKCS1.uidToken) && + Objects.equals(this.version, verifyPKCS1.version); } @Override public int hashCode() { - return Objects.hash(displayId, itemId, json, keyName, message, signature, token, uidToken); + return Objects.hash(displayId, hashFunction, inputFormat, itemId, json, keyName, message, prehashed, signature, token, uidToken, version); } @Override @@ -277,13 +389,17 @@ public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class VerifyPKCS1 {\n"); sb.append(" displayId: ").append(toIndentedString(displayId)).append("\n"); + sb.append(" hashFunction: ").append(toIndentedString(hashFunction)).append("\n"); + sb.append(" inputFormat: ").append(toIndentedString(inputFormat)).append("\n"); sb.append(" itemId: ").append(toIndentedString(itemId)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyName: ").append(toIndentedString(keyName)).append("\n"); sb.append(" message: ").append(toIndentedString(message)).append("\n"); + sb.append(" prehashed: ").append(toIndentedString(prehashed)).append("\n"); sb.append(" signature: ").append(toIndentedString(signature)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/VerifyRsaSsaPss.java b/src/main/java/io/akeyless/client/model/VerifyRsaSsaPss.java index cfa8803e..e8e77b15 100644 --- a/src/main/java/io/akeyless/client/model/VerifyRsaSsaPss.java +++ b/src/main/java/io/akeyless/client/model/VerifyRsaSsaPss.java @@ -54,6 +54,10 @@ public class VerifyRsaSsaPss { @SerializedName(SERIALIZED_NAME_MESSAGE) private String message; + public static final String SERIALIZED_NAME_PREHASHED = "prehashed"; + @SerializedName(SERIALIZED_NAME_PREHASHED) + private Boolean prehashed; + public static final String SERIALIZED_NAME_SIGNATURE = "signature"; @SerializedName(SERIALIZED_NAME_SIGNATURE) private String signature; @@ -66,6 +70,10 @@ public class VerifyRsaSsaPss { @SerializedName(SERIALIZED_NAME_UID_TOKEN) private String uidToken; + public static final String SERIALIZED_NAME_VERSION = "version"; + @SerializedName(SERIALIZED_NAME_VERSION) + private Integer version; + public VerifyRsaSsaPss() { } @@ -207,6 +215,29 @@ public void setMessage(String message) { } + public VerifyRsaSsaPss prehashed(Boolean prehashed) { + + this.prehashed = prehashed; + return this; + } + + /** + * Markes that the message is already hashed + * @return prehashed + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Markes that the message is already hashed") + + public Boolean getPrehashed() { + return prehashed; + } + + + public void setPrehashed(Boolean prehashed) { + this.prehashed = prehashed; + } + + public VerifyRsaSsaPss signature(String signature) { this.signature = signature; @@ -276,6 +307,29 @@ public void setUidToken(String uidToken) { } + public VerifyRsaSsaPss version(Integer version) { + + this.version = version; + return this; + } + + /** + * The version of the key to use for verification + * @return version + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The version of the key to use for verification") + + public Integer getVersion() { + return version; + } + + + public void setVersion(Integer version) { + this.version = version; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -291,14 +345,16 @@ public boolean equals(Object o) { Objects.equals(this.json, verifyRsaSsaPss.json) && Objects.equals(this.keyName, verifyRsaSsaPss.keyName) && Objects.equals(this.message, verifyRsaSsaPss.message) && + Objects.equals(this.prehashed, verifyRsaSsaPss.prehashed) && Objects.equals(this.signature, verifyRsaSsaPss.signature) && Objects.equals(this.token, verifyRsaSsaPss.token) && - Objects.equals(this.uidToken, verifyRsaSsaPss.uidToken); + Objects.equals(this.uidToken, verifyRsaSsaPss.uidToken) && + Objects.equals(this.version, verifyRsaSsaPss.version); } @Override public int hashCode() { - return Objects.hash(displayId, hashFunction, itemId, json, keyName, message, signature, token, uidToken); + return Objects.hash(displayId, hashFunction, itemId, json, keyName, message, prehashed, signature, token, uidToken, version); } @Override @@ -311,9 +367,11 @@ public String toString() { sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" keyName: ").append(toIndentedString(keyName)).append("\n"); sb.append(" message: ").append(toIndentedString(message)).append("\n"); + sb.append(" prehashed: ").append(toIndentedString(prehashed)).append("\n"); sb.append(" signature: ").append(toIndentedString(signature)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" version: ").append(toIndentedString(version)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/test/java/io/akeyless/client/model/CertificateVersionInfoTest.java b/src/test/java/io/akeyless/client/model/CertificateVersionInfoTest.java new file mode 100644 index 00000000..2bbfca82 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/CertificateVersionInfoTest.java @@ -0,0 +1,68 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.threeten.bp.OffsetDateTime; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for CertificateVersionInfo + */ +public class CertificateVersionInfoTest { + private final CertificateVersionInfo model = new CertificateVersionInfo(); + + /** + * Model tests for CertificateVersionInfo + */ + @Test + public void testCertificateVersionInfo() { + // TODO: test CertificateVersionInfo + } + + /** + * Test the property 'notAfter' + */ + @Test + public void notAfterTest() { + // TODO: test notAfter + } + + /** + * Test the property 'notBefore' + */ + @Test + public void notBeforeTest() { + // TODO: test notBefore + } + + /** + * Test the property 'status' + */ + @Test + public void statusTest() { + // TODO: test status + } + +} diff --git a/src/test/java/io/akeyless/client/model/ProvisionCertificateOutputTest.java b/src/test/java/io/akeyless/client/model/ProvisionCertificateOutputTest.java new file mode 100644 index 00000000..74893ad7 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/ProvisionCertificateOutputTest.java @@ -0,0 +1,78 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; +import org.threeten.bp.OffsetDateTime; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for ProvisionCertificateOutput + */ +public class ProvisionCertificateOutputTest { + private final ProvisionCertificateOutput model = new ProvisionCertificateOutput(); + + /** + * Model tests for ProvisionCertificateOutput + */ + @Test + public void testProvisionCertificateOutput() { + // TODO: test ProvisionCertificateOutput + } + + /** + * Test the property 'failMessage' + */ + @Test + public void failMessageTest() { + // TODO: test failMessage + } + + /** + * Test the property 'successMessage' + */ + @Test + public void successMessageTest() { + // TODO: test successMessage + } + + /** + * Test the property 'hostNames' + */ + @Test + public void hostNamesTest() { + // TODO: test hostNames + } + + /** + * Test the property 'provisionedAt' + */ + @Test + public void provisionedAtTest() { + // TODO: test provisionedAt + } + +} diff --git a/src/test/java/io/akeyless/client/model/ProvisionCertificateTest.java b/src/test/java/io/akeyless/client/model/ProvisionCertificateTest.java new file mode 100644 index 00000000..23961fe4 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/ProvisionCertificateTest.java @@ -0,0 +1,91 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for ProvisionCertificate + */ +public class ProvisionCertificateTest { + private final ProvisionCertificate model = new ProvisionCertificate(); + + /** + * Model tests for ProvisionCertificate + */ + @Test + public void testProvisionCertificate() { + // TODO: test ProvisionCertificate + } + + /** + * Test the property 'displayId' + */ + @Test + public void displayIdTest() { + // TODO: test displayId + } + + /** + * Test the property 'itemId' + */ + @Test + public void itemIdTest() { + // TODO: test itemId + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'name' + */ + @Test + public void nameTest() { + // TODO: test name + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + +} diff --git a/src/test/java/io/akeyless/client/model/RenewCertificateOutputTest.java b/src/test/java/io/akeyless/client/model/RenewCertificateOutputTest.java new file mode 100644 index 00000000..ad616192 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/RenewCertificateOutputTest.java @@ -0,0 +1,91 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for RenewCertificateOutput + */ +public class RenewCertificateOutputTest { + private final RenewCertificateOutput model = new RenewCertificateOutput(); + + /** + * Model tests for RenewCertificateOutput + */ + @Test + public void testRenewCertificateOutput() { + // TODO: test RenewCertificateOutput + } + + /** + * Test the property 'cert' + */ + @Test + public void certTest() { + // TODO: test cert + } + + /** + * Test the property 'certDisplayId' + */ + @Test + public void certDisplayIdTest() { + // TODO: test certDisplayId + } + + /** + * Test the property 'itemId' + */ + @Test + public void itemIdTest() { + // TODO: test itemId + } + + /** + * Test the property 'parentCert' + */ + @Test + public void parentCertTest() { + // TODO: test parentCert + } + + /** + * Test the property 'privateKey' + */ + @Test + public void privateKeyTest() { + // TODO: test privateKey + } + + /** + * Test the property 'readingToken' + */ + @Test + public void readingTokenTest() { + // TODO: test readingToken + } + +} diff --git a/src/test/java/io/akeyless/client/model/RenewCertificateTest.java b/src/test/java/io/akeyless/client/model/RenewCertificateTest.java new file mode 100644 index 00000000..d68b1660 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/RenewCertificateTest.java @@ -0,0 +1,91 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for RenewCertificate + */ +public class RenewCertificateTest { + private final RenewCertificate model = new RenewCertificate(); + + /** + * Model tests for RenewCertificate + */ + @Test + public void testRenewCertificate() { + // TODO: test RenewCertificate + } + + /** + * Test the property 'generateKey' + */ + @Test + public void generateKeyTest() { + // TODO: test generateKey + } + + /** + * Test the property 'itemId' + */ + @Test + public void itemIdTest() { + // TODO: test itemId + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'name' + */ + @Test + public void nameTest() { + // TODO: test name + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + +}