diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index 32de82e..175c419 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -11,6 +11,7 @@ docs/AccessOrGroupPermissionAssignment.md docs/AccessPermissionAssignment.md docs/AccountGeneralSettings.md docs/AccountObjectVersionSettingsOutput.md +docs/AcmeAccount.md docs/ActiveDirectoryMigration.md docs/ActiveDirectoryPayload.md docs/AddGatewayAllowedAccessId.md @@ -90,6 +91,7 @@ docs/CertificateIssueInfo.md docs/CertificateTemplateInfo.md docs/CertificateVersionInfo.md docs/CfInfo.md +docs/ChangeAdminAccountPassword.md docs/ChefTargetDetails.md docs/ClassicKeyDetailsInfo.md docs/ClassicKeyStatusInfo.md @@ -220,6 +222,7 @@ docs/DSProducerDetails.md docs/DataProtectionSection.md docs/DatadogForwardingConfig.md docs/DbTargetDetails.md +docs/DeactivateAcmeAccount.md docs/Decrypt.md docs/DecryptFile.md docs/DecryptFileOutput.md @@ -563,6 +566,8 @@ docs/GatewaysListResponse.md docs/GcpTargetDetails.md docs/GenCustomerFragment.md docs/GeneralConfigPart.md +docs/GenerateAcmeEab.md +docs/GenerateAcmeEabOutput.md docs/GenerateCsr.md docs/GenerateCsrOutput.md docs/GetAccountSettings.md @@ -668,6 +673,8 @@ docs/LdapTargetDetails.md docs/LeadershipConfigPart.md docs/LinkedDetails.md docs/LinkedTargetDetails.md +docs/ListAcmeAccounts.md +docs/ListAcmeAccountsOutput.md docs/ListAuthMethods.md docs/ListAuthMethodsOutput.md docs/ListGateways.md @@ -1043,33 +1050,13 @@ docs/WindowsServiceAttributes.md docs/WindowsTargetDetails.md docs/ZeroSSLTargetDetails.md git_push.sh -src/akeyless.Test/Model/AwsStorageTests.cs -src/akeyless.Test/Model/AzureStorageTests.cs -src/akeyless.Test/Model/BastionConfigReplyObjTests.cs -src/akeyless.Test/Model/BastionGlobalConfTests.cs -src/akeyless.Test/Model/GatewayGetRemoteAccessTests.cs -src/akeyless.Test/Model/GatewayUpdateRemoteAccessRdpRecordingsTests.cs -src/akeyless.Test/Model/GatewayUpdateRemoteAccessTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsAwsS3Tests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsAzureAnalyticsTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsDatadogTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsElasticsearchTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsGoogleChronicleTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsLogstashTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsLogzIoTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsSplunkTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsStdoutTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsSumologicTests.cs -src/akeyless.Test/Model/GwUpdateRemoteAccessSessionLogsSyslogTests.cs -src/akeyless.Test/Model/NextAutoRotationEventTests.cs -src/akeyless.Test/Model/PasswordExpirationInfoTests.cs -src/akeyless.Test/Model/ResetAccessKeyTests.cs -src/akeyless.Test/Model/ResetAuthMethodAccessKeyOutputTests.cs -src/akeyless.Test/Model/SshBastionConfTests.cs -src/akeyless.Test/Model/SshBastionSessionTerminationTests.cs -src/akeyless.Test/Model/WebBastionConfTests.cs -src/akeyless.Test/Model/WebBastionGuacamoleTests.cs -src/akeyless.Test/Model/WebBastionRdpRecordTests.cs +src/akeyless.Test/Model/AcmeAccountTests.cs +src/akeyless.Test/Model/ChangeAdminAccountPasswordTests.cs +src/akeyless.Test/Model/DeactivateAcmeAccountTests.cs +src/akeyless.Test/Model/GenerateAcmeEabOutputTests.cs +src/akeyless.Test/Model/GenerateAcmeEabTests.cs +src/akeyless.Test/Model/ListAcmeAccountsOutputTests.cs +src/akeyless.Test/Model/ListAcmeAccountsTests.cs src/akeyless.Test/akeyless.Test.csproj src/akeyless/Api/V2Api.cs src/akeyless/Client/ApiClient.cs @@ -1098,6 +1085,7 @@ src/akeyless/Model/AccessOrGroupPermissionAssignment.cs src/akeyless/Model/AccessPermissionAssignment.cs src/akeyless/Model/AccountGeneralSettings.cs src/akeyless/Model/AccountObjectVersionSettingsOutput.cs +src/akeyless/Model/AcmeAccount.cs src/akeyless/Model/ActiveDirectoryMigration.cs src/akeyless/Model/ActiveDirectoryPayload.cs src/akeyless/Model/AddGatewayAllowedAccessId.cs @@ -1177,6 +1165,7 @@ src/akeyless/Model/CertificateIssueInfo.cs src/akeyless/Model/CertificateTemplateInfo.cs src/akeyless/Model/CertificateVersionInfo.cs src/akeyless/Model/CfInfo.cs +src/akeyless/Model/ChangeAdminAccountPassword.cs src/akeyless/Model/ChefTargetDetails.cs src/akeyless/Model/ClassicKeyDetailsInfo.cs src/akeyless/Model/ClassicKeyStatusInfo.cs @@ -1307,6 +1296,7 @@ src/akeyless/Model/DSProducerDetails.cs src/akeyless/Model/DataProtectionSection.cs src/akeyless/Model/DatadogForwardingConfig.cs src/akeyless/Model/DbTargetDetails.cs +src/akeyless/Model/DeactivateAcmeAccount.cs src/akeyless/Model/Decrypt.cs src/akeyless/Model/DecryptFile.cs src/akeyless/Model/DecryptFileOutput.cs @@ -1650,6 +1640,8 @@ src/akeyless/Model/GatewaysListResponse.cs src/akeyless/Model/GcpTargetDetails.cs src/akeyless/Model/GenCustomerFragment.cs src/akeyless/Model/GeneralConfigPart.cs +src/akeyless/Model/GenerateAcmeEab.cs +src/akeyless/Model/GenerateAcmeEabOutput.cs src/akeyless/Model/GenerateCsr.cs src/akeyless/Model/GenerateCsrOutput.cs src/akeyless/Model/GetAccountSettings.cs @@ -1755,6 +1747,8 @@ src/akeyless/Model/LdapTargetDetails.cs src/akeyless/Model/LeadershipConfigPart.cs src/akeyless/Model/LinkedDetails.cs src/akeyless/Model/LinkedTargetDetails.cs +src/akeyless/Model/ListAcmeAccounts.cs +src/akeyless/Model/ListAcmeAccountsOutput.cs src/akeyless/Model/ListAuthMethods.cs src/akeyless/Model/ListAuthMethodsOutput.cs src/akeyless/Model/ListGateways.cs diff --git a/README.md b/README.md index 38f5396..14fc125 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ The purpose of this application is to provide access to Akeyless API. This C# SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: 2.0 -- SDK version: 4.2.4 +- SDK version: 4.2.5 - Build package: org.openapitools.codegen.languages.CSharpNetCoreClientCodegen For more information, please visit [http://akeyless.io](http://akeyless.io) @@ -137,6 +137,7 @@ Class | Method | HTTP request | Description *V2Api* | [**AuthMethodUpdateOauth2**](docs/V2Api.md#authmethodupdateoauth2) | **POST** /auth-method-update-oauth2 | *V2Api* | [**AuthMethodUpdateSAML**](docs/V2Api.md#authmethodupdatesaml) | **POST** /auth-method-update-saml | *V2Api* | [**AuthMethodUpdateUniversalIdentity**](docs/V2Api.md#authmethodupdateuniversalidentity) | **POST** /auth-method-update-universal-identity | +*V2Api* | [**ChangeAdminAccountPassword**](docs/V2Api.md#changeadminaccountpassword) | **POST** /change-admin-account-password | *V2Api* | [**Configure**](docs/V2Api.md#configure) | **POST** /configure | *V2Api* | [**Connect**](docs/V2Api.md#connect) | **POST** /connect | *V2Api* | [**CreateAWSTarget**](docs/V2Api.md#createawstarget) | **POST** /create-aws-target | @@ -194,6 +195,7 @@ Class | Method | HTTP request | Description *V2Api* | [**CreateWindowsTarget**](docs/V2Api.md#createwindowstarget) | **POST** /create-windows-target | *V2Api* | [**CreateZeroSSLTarget**](docs/V2Api.md#createzerossltarget) | **POST** /create-zerossl-target | *V2Api* | [**CreateldapTarget**](docs/V2Api.md#createldaptarget) | **POST** /create-ldap-target | +*V2Api* | [**DeactivateAcmeAccount**](docs/V2Api.md#deactivateacmeaccount) | **POST** /deactivate-acme-account | *V2Api* | [**Decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt | *V2Api* | [**DecryptBatch**](docs/V2Api.md#decryptbatch) | **POST** /decrypt-batch | *V2Api* | [**DecryptGPG**](docs/V2Api.md#decryptgpg) | **POST** /decrypt-gpg | @@ -406,6 +408,7 @@ Class | Method | HTTP request | Description *V2Api* | [**GatewayUpdateRemoteAccessRdpRecordings**](docs/V2Api.md#gatewayupdateremoteaccessrdprecordings) | **POST** /gateway-update-remote-access-rdp-recording | *V2Api* | [**GatewayUpdateTlsCert**](docs/V2Api.md#gatewayupdatetlscert) | **POST** /gateway-update-tls-cert | *V2Api* | [**GatewayUpdateTmpUsers**](docs/V2Api.md#gatewayupdatetmpusers) | **POST** /gateway-update-producer-tmp-creds | +*V2Api* | [**GenerateAcmeEab**](docs/V2Api.md#generateacmeeab) | **POST** /generate-acme-eab | *V2Api* | [**GenerateCsr**](docs/V2Api.md#generatecsr) | **POST** /generate-csr | *V2Api* | [**GetAccountLogo**](docs/V2Api.md#getaccountlogo) | **POST** /get-account-logo | *V2Api* | [**GetAccountSettings**](docs/V2Api.md#getaccountsettings) | **POST** /get-account-settings | @@ -452,6 +455,7 @@ Class | Method | HTTP request | Description *V2Api* | [**KmipRenewServerCertificate**](docs/V2Api.md#kmiprenewservercertificate) | **POST** /kmip-renew-environment | *V2Api* | [**KmipServerSetup**](docs/V2Api.md#kmipserversetup) | **POST** /kmip-create-environment | *V2Api* | [**KmipSetServerState**](docs/V2Api.md#kmipsetserverstate) | **POST** /kmip-set-environment-state | +*V2Api* | [**ListAcmeAccounts**](docs/V2Api.md#listacmeaccounts) | **POST** /list-acme-accounts | *V2Api* | [**ListAuthMethods**](docs/V2Api.md#listauthmethods) | **POST** /list-auth-methods | *V2Api* | [**ListGateways**](docs/V2Api.md#listgateways) | **POST** /list-gateways | *V2Api* | [**ListGroups**](docs/V2Api.md#listgroups) | **POST** /list-group | @@ -670,6 +674,7 @@ Class | Method | HTTP request | Description - [Model.AccessPermissionAssignment](docs/AccessPermissionAssignment.md) - [Model.AccountGeneralSettings](docs/AccountGeneralSettings.md) - [Model.AccountObjectVersionSettingsOutput](docs/AccountObjectVersionSettingsOutput.md) + - [Model.AcmeAccount](docs/AcmeAccount.md) - [Model.ActiveDirectoryMigration](docs/ActiveDirectoryMigration.md) - [Model.ActiveDirectoryPayload](docs/ActiveDirectoryPayload.md) - [Model.AddGatewayAllowedAccessId](docs/AddGatewayAllowedAccessId.md) @@ -749,6 +754,7 @@ Class | Method | HTTP request | Description - [Model.CertificateTemplateInfo](docs/CertificateTemplateInfo.md) - [Model.CertificateVersionInfo](docs/CertificateVersionInfo.md) - [Model.CfInfo](docs/CfInfo.md) + - [Model.ChangeAdminAccountPassword](docs/ChangeAdminAccountPassword.md) - [Model.ChefTargetDetails](docs/ChefTargetDetails.md) - [Model.ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md) - [Model.ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md) @@ -879,6 +885,7 @@ Class | Method | HTTP request | Description - [Model.DataProtectionSection](docs/DataProtectionSection.md) - [Model.DatadogForwardingConfig](docs/DatadogForwardingConfig.md) - [Model.DbTargetDetails](docs/DbTargetDetails.md) + - [Model.DeactivateAcmeAccount](docs/DeactivateAcmeAccount.md) - [Model.Decrypt](docs/Decrypt.md) - [Model.DecryptFile](docs/DecryptFile.md) - [Model.DecryptFileOutput](docs/DecryptFileOutput.md) @@ -1222,6 +1229,8 @@ Class | Method | HTTP request | Description - [Model.GcpTargetDetails](docs/GcpTargetDetails.md) - [Model.GenCustomerFragment](docs/GenCustomerFragment.md) - [Model.GeneralConfigPart](docs/GeneralConfigPart.md) + - [Model.GenerateAcmeEab](docs/GenerateAcmeEab.md) + - [Model.GenerateAcmeEabOutput](docs/GenerateAcmeEabOutput.md) - [Model.GenerateCsr](docs/GenerateCsr.md) - [Model.GenerateCsrOutput](docs/GenerateCsrOutput.md) - [Model.GetAccountSettings](docs/GetAccountSettings.md) @@ -1327,6 +1336,8 @@ Class | Method | HTTP request | Description - [Model.LeadershipConfigPart](docs/LeadershipConfigPart.md) - [Model.LinkedDetails](docs/LinkedDetails.md) - [Model.LinkedTargetDetails](docs/LinkedTargetDetails.md) + - [Model.ListAcmeAccounts](docs/ListAcmeAccounts.md) + - [Model.ListAcmeAccountsOutput](docs/ListAcmeAccountsOutput.md) - [Model.ListAuthMethods](docs/ListAuthMethods.md) - [Model.ListAuthMethodsOutput](docs/ListAuthMethodsOutput.md) - [Model.ListGateways](docs/ListGateways.md) diff --git a/akeyless.sln b/akeyless.sln index cc5fd80..7b73d52 100644 --- a/akeyless.sln +++ b/akeyless.sln @@ -2,7 +2,7 @@ Microsoft Visual Studio Solution File, Format Version 12.00 # Visual Studio 2012 VisualStudioVersion = 12.0.0.0 MinimumVisualStudioVersion = 10.0.0.1 -Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless", "src\akeyless\akeyless.csproj", "{CEB3E8F2-80A1-44AC-9E69-3FFAC3C899CE}" +Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless", "src\akeyless\akeyless.csproj", "{6E9E1F6F-A95F-4055-B986-624EDADBA3D1}" EndProject Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless.Test", "src\akeyless.Test\akeyless.Test.csproj", "{19F1DEBC-DE5E-4517-8062-F000CD499087}" EndProject @@ -12,10 +12,10 @@ Global Release|Any CPU = Release|Any CPU EndGlobalSection GlobalSection(ProjectConfigurationPlatforms) = postSolution - {CEB3E8F2-80A1-44AC-9E69-3FFAC3C899CE}.Debug|Any CPU.ActiveCfg = Debug|Any CPU - {CEB3E8F2-80A1-44AC-9E69-3FFAC3C899CE}.Debug|Any CPU.Build.0 = Debug|Any CPU - {CEB3E8F2-80A1-44AC-9E69-3FFAC3C899CE}.Release|Any CPU.ActiveCfg = Release|Any CPU - {CEB3E8F2-80A1-44AC-9E69-3FFAC3C899CE}.Release|Any CPU.Build.0 = Release|Any CPU + {6E9E1F6F-A95F-4055-B986-624EDADBA3D1}.Debug|Any CPU.ActiveCfg = Debug|Any CPU + {6E9E1F6F-A95F-4055-B986-624EDADBA3D1}.Debug|Any CPU.Build.0 = Debug|Any CPU + {6E9E1F6F-A95F-4055-B986-624EDADBA3D1}.Release|Any CPU.ActiveCfg = Release|Any CPU + {6E9E1F6F-A95F-4055-B986-624EDADBA3D1}.Release|Any CPU.Build.0 = Release|Any CPU {19F1DEBC-DE5E-4517-8062-F000CD499087}.Debug|Any CPU.ActiveCfg = Debug|Any CPU {19F1DEBC-DE5E-4517-8062-F000CD499087}.Debug|Any CPU.Build.0 = Debug|Any CPU {19F1DEBC-DE5E-4517-8062-F000CD499087}.Release|Any CPU.ActiveCfg = Release|Any CPU diff --git a/docs/AcmeAccount.md b/docs/AcmeAccount.md new file mode 100644 index 0000000..9891506 --- /dev/null +++ b/docs/AcmeAccount.md @@ -0,0 +1,13 @@ +# akeyless.Model.AcmeAccount +AcmeAccount is copied without the jwk as it seems like it has issues with sdk + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AccountId** | **string** | AccountId is the ACME account id, not Akeyless account id | [optional] +**KeyDigest** | **string** | | [optional] +**Status** | **string** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/AuthMethodRoleAssociation.md b/docs/AuthMethodRoleAssociation.md index b370d4b..23ecd16 100644 --- a/docs/AuthMethodRoleAssociation.md +++ b/docs/AuthMethodRoleAssociation.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **AssocId** | **string** | | [optional] **AuthMethodSubClaims** | **Dictionary<string, List<string>>** | | [optional] **IsSubClaimsCaseSensitive** | **bool** | | [optional] +**IsSubclaimsWithOperator** | **bool** | | [optional] **RoleName** | **string** | | [optional] **Rules** | [**Rules**](Rules.md) | | [optional] diff --git a/docs/ChangeAdminAccountPassword.md b/docs/ChangeAdminAccountPassword.md new file mode 100644 index 0000000..d143890 --- /dev/null +++ b/docs/ChangeAdminAccountPassword.md @@ -0,0 +1,14 @@ +# akeyless.Model.ChangeAdminAccountPassword + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CurrentPassword** | **string** | Current password | +**Json** | **bool** | Set output format to JSON | [optional] [default to false] +**NewPassword** | **string** | New password | +**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional] +**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/CreatePKICertIssuer.md b/docs/CreatePKICertIssuer.md index 365fe66..d73ac62 100644 --- a/docs/CreatePKICertIssuer.md +++ b/docs/CreatePKICertIssuer.md @@ -16,11 +16,13 @@ Name | Type | Description | Notes **Country** | **string** | A comma-separated list of countries that will be set in the issued certificate | [optional] **CreatePrivateCrl** | **bool** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] **CreatePublicCrl** | **bool** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] +**CriticalKeyUsage** | **string** | Mark key usage as critical [true/false] | [optional] [default to "true"] **DeleteProtection** | **string** | Protection from accidental deletion of this object [true/false] | [optional] **Description** | **string** | Description of the object | [optional] **DestinationPath** | **string** | A path in which to save generated certificates | [optional] +**EnableAcme** | **bool** | If set, the cert issuer will support the acme protocol | [optional] **ExpirationEventIn** | **List<string>** | How many days before the expiration of the certificate would you like to be notified. | [optional] -**GwClusterUrl** | **string** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] +**GwClusterUrl** | **string** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] **IsCa** | **bool** | If set, the basic constraints extension will be added to certificate | [optional] **Json** | **bool** | Set output format to JSON | [optional] [default to false] **KeyUsage** | **string** | key-usage | [optional] [default to "DigitalSignature,KeyAgreement,KeyEncipherment"] diff --git a/docs/DeactivateAcmeAccount.md b/docs/DeactivateAcmeAccount.md new file mode 100644 index 0000000..f2b1b8e --- /dev/null +++ b/docs/DeactivateAcmeAccount.md @@ -0,0 +1,16 @@ +# akeyless.Model.DeactivateAcmeAccount +deactivateAcmeAccount is a command that Deactivates \\ Deletes an acme external account + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**AcmeAccountId** | **string** | The acme account id to deactivate | +**CertIssuerName** | **string** | The name of the PKI certificate issuer | +**DeleteAccount** | **bool** | Delete the account | [optional] +**Json** | **bool** | Set output format to JSON | [optional] [default to false] +**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional] +**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/GenerateAcmeEab.md b/docs/GenerateAcmeEab.md new file mode 100644 index 0000000..be53513 --- /dev/null +++ b/docs/GenerateAcmeEab.md @@ -0,0 +1,13 @@ +# akeyless.Model.GenerateAcmeEab + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CertIssuerName** | **string** | The name of the PKI certificate issuer | +**Json** | **bool** | Set output format to JSON | [optional] [default to false] +**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional] +**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/GenerateAcmeEabOutput.md b/docs/GenerateAcmeEabOutput.md new file mode 100644 index 0000000..253589f --- /dev/null +++ b/docs/GenerateAcmeEabOutput.md @@ -0,0 +1,12 @@ +# akeyless.Model.GenerateAcmeEabOutput + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**ExpiresAt** | **DateTime** | | [optional] +**Kid** | **string** | | [optional] +**MacKey** | **string** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/GetGroupOutput.md b/docs/GetGroupOutput.md index 687b4e3..665f9da 100644 --- a/docs/GetGroupOutput.md +++ b/docs/GetGroupOutput.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **GroupAlias** | **string** | | [optional] **GroupId** | **string** | | [optional] **GroupName** | **string** | | [optional] +**IsSubclaimsWithOperator** | **bool** | | [optional] **ModificationDate** | **DateTime** | | [optional] **UserAssignments** | [**List<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] diff --git a/docs/GetKubeExecCreds.md b/docs/GetKubeExecCreds.md index ce447f1..c9ff394 100644 --- a/docs/GetKubeExecCreds.md +++ b/docs/GetKubeExecCreds.md @@ -10,7 +10,7 @@ Name | Type | Description | Notes **CertIssuerName** | **string** | The name of the PKI certificate issuer | **CommonName** | **string** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] **CsrDataBase64** | **string** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] -**ExtendedKeyUsage** | **string** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] +**ExtendedKeyUsage** | **string** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] **ExtraExtensions** | **string** | A json string that defines the requested extra extensions for the certificate | [optional] **Json** | **bool** | Set output format to JSON | [optional] [default to false] **KeyDataBase64** | **string** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] diff --git a/docs/GetPKICertificate.md b/docs/GetPKICertificate.md index 84d3be2..fc830f3 100644 --- a/docs/GetPKICertificate.md +++ b/docs/GetPKICertificate.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **CertIssuerName** | **string** | The name of the PKI certificate issuer | **CommonName** | **string** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] **CsrDataBase64** | **string** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] -**ExtendedKeyUsage** | **string** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] +**ExtendedKeyUsage** | **string** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] **ExtraExtensions** | **string** | A json string that defines the requested extra extensions for the certificate | [optional] **Json** | **bool** | Set output format to JSON | [optional] [default to false] **KeyDataBase64** | **string** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] diff --git a/docs/Group.md b/docs/Group.md index ae0a62f..5da1a02 100644 --- a/docs/Group.md +++ b/docs/Group.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **GroupAlias** | **string** | | [optional] **GroupId** | **string** | | [optional] **GroupName** | **string** | | [optional] +**IsSubclaimsWithOperator** | **bool** | | [optional] **ModificationDate** | **DateTime** | | [optional] **UserAssignments** | [**List<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] diff --git a/docs/ListAcmeAccounts.md b/docs/ListAcmeAccounts.md new file mode 100644 index 0000000..d97172d --- /dev/null +++ b/docs/ListAcmeAccounts.md @@ -0,0 +1,14 @@ +# akeyless.Model.ListAcmeAccounts +listAcmeAccounts is a command lists acme external accounts for a cert issuer + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**CertIssuerName** | **string** | The name of the PKI certificate issuer | +**Json** | **bool** | Set output format to JSON | [optional] [default to false] +**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional] +**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/ListAcmeAccountsOutput.md b/docs/ListAcmeAccountsOutput.md new file mode 100644 index 0000000..3f5ef1b --- /dev/null +++ b/docs/ListAcmeAccountsOutput.md @@ -0,0 +1,10 @@ +# akeyless.Model.ListAcmeAccountsOutput + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**Accounts** | [**List<AcmeAccount>**](AcmeAccount.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + diff --git a/docs/PKICertificateIssueDetails.md b/docs/PKICertificateIssueDetails.md index 1fd0653..9a9c3da 100644 --- a/docs/PKICertificateIssueDetails.md +++ b/docs/PKICertificateIssueDetails.md @@ -4,6 +4,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**AcmeEnabled** | **bool** | | [optional] **AllowAnyName** | **bool** | | [optional] **AllowCopyExtFromCsr** | **bool** | | [optional] **AllowSubdomains** | **bool** | | [optional] @@ -27,6 +28,7 @@ Name | Type | Description | Notes **KeyType** | **string** | | [optional] **KeyUsageList** | **List<string>** | | [optional] **Locality** | **List<string>** | | [optional] +**NonCriticalKeyUsage** | **bool** | | [optional] **NotBeforeDuration** | **long** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] **OrganizationList** | **List<string>** | | [optional] **OrganizationUnitList** | **List<string>** | | [optional] diff --git a/docs/RoleAssociationDetails.md b/docs/RoleAssociationDetails.md index 7f83e9a..e725715 100644 --- a/docs/RoleAssociationDetails.md +++ b/docs/RoleAssociationDetails.md @@ -8,6 +8,7 @@ Name | Type | Description | Notes **AssocId** | **string** | | [optional] **AuthMethodName** | **string** | | [optional] **AuthMethodSubClaims** | **Dictionary<string, List<string>>** | | [optional] +**IsSubclaimsWithOperator** | **bool** | | [optional] **RoleName** | **string** | | [optional] **SubClaimsCaseSensitive** | **bool** | | [optional] diff --git a/docs/RoleAuthMethodAssociation.md b/docs/RoleAuthMethodAssociation.md index 7799aff..ca0fbf8 100644 --- a/docs/RoleAuthMethodAssociation.md +++ b/docs/RoleAuthMethodAssociation.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **AuthMethodAccessId** | **string** | | [optional] **AuthMethodName** | **string** | | [optional] **AuthMethodSubClaims** | **Dictionary<string, List<string>>** | | [optional] +**IsSubclaimsWithOperator** | **bool** | | [optional] **SubClaimsCaseSensitive** | **bool** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/UpdateClassicKeyCertificate.md b/docs/UpdateClassicKeyCertificate.md index 4d5314d..e75cc69 100644 --- a/docs/UpdateClassicKeyCertificate.md +++ b/docs/UpdateClassicKeyCertificate.md @@ -6,6 +6,7 @@ UpdateClassicKeyCertificate is a command that updates the certificate for a clas Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **CertFileData** | **string** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**CertificateFormat** | **string** | | [optional] **Json** | **bool** | Set output format to JSON | [optional] [default to false] **Name** | **string** | ClassicKey name | **Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/UpdateItem.md b/docs/UpdateItem.md index 18a5875..4a09bba 100644 --- a/docs/UpdateItem.md +++ b/docs/UpdateItem.md @@ -8,6 +8,7 @@ Name | Type | Description | Notes **Accessibility** | **string** | for personal password manager | [optional] [default to "regular"] **AddTag** | **List<string>** | List of the new tags that will be attached to this item | [optional] **CertFileData** | **string** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**CertificateFormat** | **string** | | [optional] **ChangeEvent** | **string** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] **DeleteProtection** | **string** | Protection from accidental deletion of this object [true/false] | [optional] **Description** | **string** | Description of the object | [optional] [default to "default_metadata"] diff --git a/docs/UpdatePKICertIssuer.md b/docs/UpdatePKICertIssuer.md index b6d79cb..9742a30 100644 --- a/docs/UpdatePKICertIssuer.md +++ b/docs/UpdatePKICertIssuer.md @@ -16,11 +16,13 @@ Name | Type | Description | Notes **Country** | **string** | A comma-separated list of countries that will be set in the issued certificate | [optional] **CreatePrivateCrl** | **bool** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] **CreatePublicCrl** | **bool** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] +**CriticalKeyUsage** | **string** | Mark key usage as critical [true/false] | [optional] [default to "true"] **DeleteProtection** | **string** | Protection from accidental deletion of this object [true/false] | [optional] **Description** | **string** | Description of the object | [optional] **DestinationPath** | **string** | A path in which to save generated certificates | [optional] +**EnableAcme** | **bool** | If set, the cert issuer will support the acme protocol | [optional] **ExpirationEventIn** | **List<string>** | How many days before the expiration of the certificate would you like to be notified. | [optional] -**GwClusterUrl** | **string** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] +**GwClusterUrl** | **string** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] **IsCa** | **bool** | If set, the basic constraints extension will be added to certificate | [optional] **Json** | **bool** | Set output format to JSON | [optional] [default to false] **KeyUsage** | **string** | key-usage | [optional] [default to "DigitalSignature,KeyAgreement,KeyEncipherment"] diff --git a/docs/V2Api.md b/docs/V2Api.md index 4cf3d62..7a9da87 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -37,6 +37,7 @@ All URIs are relative to *https://api.akeyless.io* | [**AuthMethodUpdateOauth2**](V2Api.md#authmethodupdateoauth2) | **POST** /auth-method-update-oauth2 | | | [**AuthMethodUpdateSAML**](V2Api.md#authmethodupdatesaml) | **POST** /auth-method-update-saml | | | [**AuthMethodUpdateUniversalIdentity**](V2Api.md#authmethodupdateuniversalidentity) | **POST** /auth-method-update-universal-identity | | +| [**ChangeAdminAccountPassword**](V2Api.md#changeadminaccountpassword) | **POST** /change-admin-account-password | | | [**Configure**](V2Api.md#configure) | **POST** /configure | | | [**Connect**](V2Api.md#connect) | **POST** /connect | | | [**CreateAWSTarget**](V2Api.md#createawstarget) | **POST** /create-aws-target | | @@ -94,6 +95,7 @@ All URIs are relative to *https://api.akeyless.io* | [**CreateWindowsTarget**](V2Api.md#createwindowstarget) | **POST** /create-windows-target | | | [**CreateZeroSSLTarget**](V2Api.md#createzerossltarget) | **POST** /create-zerossl-target | | | [**CreateldapTarget**](V2Api.md#createldaptarget) | **POST** /create-ldap-target | | +| [**DeactivateAcmeAccount**](V2Api.md#deactivateacmeaccount) | **POST** /deactivate-acme-account | | | [**Decrypt**](V2Api.md#decrypt) | **POST** /decrypt | | | [**DecryptBatch**](V2Api.md#decryptbatch) | **POST** /decrypt-batch | | | [**DecryptGPG**](V2Api.md#decryptgpg) | **POST** /decrypt-gpg | | @@ -306,6 +308,7 @@ All URIs are relative to *https://api.akeyless.io* | [**GatewayUpdateRemoteAccessRdpRecordings**](V2Api.md#gatewayupdateremoteaccessrdprecordings) | **POST** /gateway-update-remote-access-rdp-recording | | | [**GatewayUpdateTlsCert**](V2Api.md#gatewayupdatetlscert) | **POST** /gateway-update-tls-cert | | | [**GatewayUpdateTmpUsers**](V2Api.md#gatewayupdatetmpusers) | **POST** /gateway-update-producer-tmp-creds | | +| [**GenerateAcmeEab**](V2Api.md#generateacmeeab) | **POST** /generate-acme-eab | | | [**GenerateCsr**](V2Api.md#generatecsr) | **POST** /generate-csr | | | [**GetAccountLogo**](V2Api.md#getaccountlogo) | **POST** /get-account-logo | | | [**GetAccountSettings**](V2Api.md#getaccountsettings) | **POST** /get-account-settings | | @@ -352,6 +355,7 @@ All URIs are relative to *https://api.akeyless.io* | [**KmipRenewServerCertificate**](V2Api.md#kmiprenewservercertificate) | **POST** /kmip-renew-environment | | | [**KmipServerSetup**](V2Api.md#kmipserversetup) | **POST** /kmip-create-environment | | | [**KmipSetServerState**](V2Api.md#kmipsetserverstate) | **POST** /kmip-set-environment-state | | +| [**ListAcmeAccounts**](V2Api.md#listacmeaccounts) | **POST** /list-acme-accounts | | | [**ListAuthMethods**](V2Api.md#listauthmethods) | **POST** /list-auth-methods | | | [**ListGateways**](V2Api.md#listgateways) | **POST** /list-gateways | | | [**ListGroups**](V2Api.md#listgroups) | **POST** /list-group | | @@ -3462,6 +3466,94 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **ChangeAdminAccountPassword** +> Object ChangeAdminAccountPassword (ChangeAdminAccountPassword body) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; +using akeyless.Api; +using akeyless.Client; +using akeyless.Model; + +namespace Example +{ + public class ChangeAdminAccountPasswordExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "https://api.akeyless.io"; + var apiInstance = new V2Api(config); + var body = new ChangeAdminAccountPassword(); // ChangeAdminAccountPassword | + + try + { + Object result = apiInstance.ChangeAdminAccountPassword(body); + Debug.WriteLine(result); + } + catch (ApiException e) + { + Debug.Print("Exception when calling V2Api.ChangeAdminAccountPassword: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); + } + } + } +} +``` + +#### Using the ChangeAdminAccountPasswordWithHttpInfo variant +This returns an ApiResponse object which contains the response data, status code and headers. + +```csharp +try +{ + ApiResponse response = apiInstance.ChangeAdminAccountPasswordWithHttpInfo(body); + Debug.Write("Status Code: " + response.StatusCode); + Debug.Write("Response Headers: " + response.Headers); + Debug.Write("Response Body: " + response.Data); +} +catch (ApiException e) +{ + Debug.Print("Exception when calling V2Api.ChangeAdminAccountPasswordWithHttpInfo: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------|------|-------------|-------| +| **body** | [**ChangeAdminAccountPassword**](ChangeAdminAccountPassword.md) | | | + +### Return type + +**Object** + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | changeAdminAccountPasswordResponse wraps response body. | - | +| **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **Configure** > ConfigureOutput Configure (Configure body) @@ -8478,6 +8570,94 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **DeactivateAcmeAccount** +> Object DeactivateAcmeAccount (DeactivateAcmeAccount body) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; +using akeyless.Api; +using akeyless.Client; +using akeyless.Model; + +namespace Example +{ + public class DeactivateAcmeAccountExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "https://api.akeyless.io"; + var apiInstance = new V2Api(config); + var body = new DeactivateAcmeAccount(); // DeactivateAcmeAccount | + + try + { + Object result = apiInstance.DeactivateAcmeAccount(body); + Debug.WriteLine(result); + } + catch (ApiException e) + { + Debug.Print("Exception when calling V2Api.DeactivateAcmeAccount: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); + } + } + } +} +``` + +#### Using the DeactivateAcmeAccountWithHttpInfo variant +This returns an ApiResponse object which contains the response data, status code and headers. + +```csharp +try +{ + ApiResponse response = apiInstance.DeactivateAcmeAccountWithHttpInfo(body); + Debug.Write("Status Code: " + response.StatusCode); + Debug.Write("Response Headers: " + response.Headers); + Debug.Write("Response Body: " + response.Data); +} +catch (ApiException e) +{ + Debug.Print("Exception when calling V2Api.DeactivateAcmeAccountWithHttpInfo: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------|------|-------------|-------| +| **body** | [**DeactivateAcmeAccount**](DeactivateAcmeAccount.md) | | | + +### Return type + +**Object** + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | deactivateAcmeAccountResponse wraps response body. | - | +| **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **Decrypt** > DecryptOutput Decrypt (Decrypt body) @@ -27114,6 +27294,94 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **GenerateAcmeEab** +> GenerateAcmeEabOutput GenerateAcmeEab (GenerateAcmeEab body) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; +using akeyless.Api; +using akeyless.Client; +using akeyless.Model; + +namespace Example +{ + public class GenerateAcmeEabExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "https://api.akeyless.io"; + var apiInstance = new V2Api(config); + var body = new GenerateAcmeEab(); // GenerateAcmeEab | + + try + { + GenerateAcmeEabOutput result = apiInstance.GenerateAcmeEab(body); + Debug.WriteLine(result); + } + catch (ApiException e) + { + Debug.Print("Exception when calling V2Api.GenerateAcmeEab: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); + } + } + } +} +``` + +#### Using the GenerateAcmeEabWithHttpInfo variant +This returns an ApiResponse object which contains the response data, status code and headers. + +```csharp +try +{ + ApiResponse response = apiInstance.GenerateAcmeEabWithHttpInfo(body); + Debug.Write("Status Code: " + response.StatusCode); + Debug.Write("Response Headers: " + response.Headers); + Debug.Write("Response Body: " + response.Data); +} +catch (ApiException e) +{ + Debug.Print("Exception when calling V2Api.GenerateAcmeEabWithHttpInfo: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------|------|-------------|-------| +| **body** | [**GenerateAcmeEab**](GenerateAcmeEab.md) | | | + +### Return type + +[**GenerateAcmeEabOutput**](GenerateAcmeEabOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | generateAcmeEabResponse wraps response body. | - | +| **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **GenerateCsr** > GenerateCsrOutput GenerateCsr (GenerateCsr body) @@ -31157,6 +31425,94 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + +# **ListAcmeAccounts** +> ListAcmeAccountsOutput ListAcmeAccounts (ListAcmeAccounts body) + + + +### Example +```csharp +using System.Collections.Generic; +using System.Diagnostics; +using akeyless.Api; +using akeyless.Client; +using akeyless.Model; + +namespace Example +{ + public class ListAcmeAccountsExample + { + public static void Main() + { + Configuration config = new Configuration(); + config.BasePath = "https://api.akeyless.io"; + var apiInstance = new V2Api(config); + var body = new ListAcmeAccounts(); // ListAcmeAccounts | + + try + { + ListAcmeAccountsOutput result = apiInstance.ListAcmeAccounts(body); + Debug.WriteLine(result); + } + catch (ApiException e) + { + Debug.Print("Exception when calling V2Api.ListAcmeAccounts: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); + } + } + } +} +``` + +#### Using the ListAcmeAccountsWithHttpInfo variant +This returns an ApiResponse object which contains the response data, status code and headers. + +```csharp +try +{ + ApiResponse response = apiInstance.ListAcmeAccountsWithHttpInfo(body); + Debug.Write("Status Code: " + response.StatusCode); + Debug.Write("Response Headers: " + response.Headers); + Debug.Write("Response Body: " + response.Data); +} +catch (ApiException e) +{ + Debug.Print("Exception when calling V2Api.ListAcmeAccountsWithHttpInfo: " + e.Message); + Debug.Print("Status Code: " + e.ErrorCode); + Debug.Print(e.StackTrace); +} +``` + +### Parameters + +| Name | Type | Description | Notes | +|------|------|-------------|-------| +| **body** | [**ListAcmeAccounts**](ListAcmeAccounts.md) | | | + +### Return type + +[**ListAcmeAccountsOutput**](ListAcmeAccountsOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +| **200** | listAcmeAccountsResponse wraps response body. | - | +| **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **ListAuthMethods** > ListAuthMethodsOutput ListAuthMethods (ListAuthMethods body) diff --git a/src/akeyless.Test/Model/AcmeAccountTests.cs b/src/akeyless.Test/Model/AcmeAccountTests.cs new file mode 100644 index 0000000..010bf8b --- /dev/null +++ b/src/akeyless.Test/Model/AcmeAccountTests.cs @@ -0,0 +1,87 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing AcmeAccount + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class AcmeAccountTests : IDisposable + { + // TODO uncomment below to declare an instance variable for AcmeAccount + //private AcmeAccount instance; + + public AcmeAccountTests() + { + // TODO uncomment below to create an instance of AcmeAccount + //instance = new AcmeAccount(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of AcmeAccount + /// + [Fact] + public void AcmeAccountInstanceTest() + { + // TODO uncomment below to test "IsType" AcmeAccount + //Assert.IsType(instance); + } + + + /// + /// Test the property 'AccountId' + /// + [Fact] + public void AccountIdTest() + { + // TODO unit test for the property 'AccountId' + } + /// + /// Test the property 'KeyDigest' + /// + [Fact] + public void KeyDigestTest() + { + // TODO unit test for the property 'KeyDigest' + } + /// + /// Test the property 'Status' + /// + [Fact] + public void StatusTest() + { + // TODO unit test for the property 'Status' + } + + } + +} diff --git a/src/akeyless.Test/Model/ChangeAdminAccountPasswordTests.cs b/src/akeyless.Test/Model/ChangeAdminAccountPasswordTests.cs new file mode 100644 index 0000000..84b388f --- /dev/null +++ b/src/akeyless.Test/Model/ChangeAdminAccountPasswordTests.cs @@ -0,0 +1,103 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing ChangeAdminAccountPassword + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class ChangeAdminAccountPasswordTests : IDisposable + { + // TODO uncomment below to declare an instance variable for ChangeAdminAccountPassword + //private ChangeAdminAccountPassword instance; + + public ChangeAdminAccountPasswordTests() + { + // TODO uncomment below to create an instance of ChangeAdminAccountPassword + //instance = new ChangeAdminAccountPassword(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of ChangeAdminAccountPassword + /// + [Fact] + public void ChangeAdminAccountPasswordInstanceTest() + { + // TODO uncomment below to test "IsType" ChangeAdminAccountPassword + //Assert.IsType(instance); + } + + + /// + /// Test the property 'CurrentPassword' + /// + [Fact] + public void CurrentPasswordTest() + { + // TODO unit test for the property 'CurrentPassword' + } + /// + /// Test the property 'Json' + /// + [Fact] + public void JsonTest() + { + // TODO unit test for the property 'Json' + } + /// + /// Test the property 'NewPassword' + /// + [Fact] + public void NewPasswordTest() + { + // TODO unit test for the property 'NewPassword' + } + /// + /// Test the property 'Token' + /// + [Fact] + public void TokenTest() + { + // TODO unit test for the property 'Token' + } + /// + /// Test the property 'UidToken' + /// + [Fact] + public void UidTokenTest() + { + // TODO unit test for the property 'UidToken' + } + + } + +} diff --git a/src/akeyless.Test/Model/DeactivateAcmeAccountTests.cs b/src/akeyless.Test/Model/DeactivateAcmeAccountTests.cs new file mode 100644 index 0000000..1c6ef2a --- /dev/null +++ b/src/akeyless.Test/Model/DeactivateAcmeAccountTests.cs @@ -0,0 +1,111 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing DeactivateAcmeAccount + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class DeactivateAcmeAccountTests : IDisposable + { + // TODO uncomment below to declare an instance variable for DeactivateAcmeAccount + //private DeactivateAcmeAccount instance; + + public DeactivateAcmeAccountTests() + { + // TODO uncomment below to create an instance of DeactivateAcmeAccount + //instance = new DeactivateAcmeAccount(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of DeactivateAcmeAccount + /// + [Fact] + public void DeactivateAcmeAccountInstanceTest() + { + // TODO uncomment below to test "IsType" DeactivateAcmeAccount + //Assert.IsType(instance); + } + + + /// + /// Test the property 'AcmeAccountId' + /// + [Fact] + public void AcmeAccountIdTest() + { + // TODO unit test for the property 'AcmeAccountId' + } + /// + /// Test the property 'CertIssuerName' + /// + [Fact] + public void CertIssuerNameTest() + { + // TODO unit test for the property 'CertIssuerName' + } + /// + /// Test the property 'DeleteAccount' + /// + [Fact] + public void DeleteAccountTest() + { + // TODO unit test for the property 'DeleteAccount' + } + /// + /// Test the property 'Json' + /// + [Fact] + public void JsonTest() + { + // TODO unit test for the property 'Json' + } + /// + /// Test the property 'Token' + /// + [Fact] + public void TokenTest() + { + // TODO unit test for the property 'Token' + } + /// + /// Test the property 'UidToken' + /// + [Fact] + public void UidTokenTest() + { + // TODO unit test for the property 'UidToken' + } + + } + +} diff --git a/src/akeyless.Test/Model/GenerateAcmeEabOutputTests.cs b/src/akeyless.Test/Model/GenerateAcmeEabOutputTests.cs new file mode 100644 index 0000000..45e4e92 --- /dev/null +++ b/src/akeyless.Test/Model/GenerateAcmeEabOutputTests.cs @@ -0,0 +1,87 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing GenerateAcmeEabOutput + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class GenerateAcmeEabOutputTests : IDisposable + { + // TODO uncomment below to declare an instance variable for GenerateAcmeEabOutput + //private GenerateAcmeEabOutput instance; + + public GenerateAcmeEabOutputTests() + { + // TODO uncomment below to create an instance of GenerateAcmeEabOutput + //instance = new GenerateAcmeEabOutput(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of GenerateAcmeEabOutput + /// + [Fact] + public void GenerateAcmeEabOutputInstanceTest() + { + // TODO uncomment below to test "IsType" GenerateAcmeEabOutput + //Assert.IsType(instance); + } + + + /// + /// Test the property 'ExpiresAt' + /// + [Fact] + public void ExpiresAtTest() + { + // TODO unit test for the property 'ExpiresAt' + } + /// + /// Test the property 'Kid' + /// + [Fact] + public void KidTest() + { + // TODO unit test for the property 'Kid' + } + /// + /// Test the property 'MacKey' + /// + [Fact] + public void MacKeyTest() + { + // TODO unit test for the property 'MacKey' + } + + } + +} diff --git a/src/akeyless.Test/Model/GenerateAcmeEabTests.cs b/src/akeyless.Test/Model/GenerateAcmeEabTests.cs new file mode 100644 index 0000000..3456fba --- /dev/null +++ b/src/akeyless.Test/Model/GenerateAcmeEabTests.cs @@ -0,0 +1,95 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing GenerateAcmeEab + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class GenerateAcmeEabTests : IDisposable + { + // TODO uncomment below to declare an instance variable for GenerateAcmeEab + //private GenerateAcmeEab instance; + + public GenerateAcmeEabTests() + { + // TODO uncomment below to create an instance of GenerateAcmeEab + //instance = new GenerateAcmeEab(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of GenerateAcmeEab + /// + [Fact] + public void GenerateAcmeEabInstanceTest() + { + // TODO uncomment below to test "IsType" GenerateAcmeEab + //Assert.IsType(instance); + } + + + /// + /// Test the property 'CertIssuerName' + /// + [Fact] + public void CertIssuerNameTest() + { + // TODO unit test for the property 'CertIssuerName' + } + /// + /// Test the property 'Json' + /// + [Fact] + public void JsonTest() + { + // TODO unit test for the property 'Json' + } + /// + /// Test the property 'Token' + /// + [Fact] + public void TokenTest() + { + // TODO unit test for the property 'Token' + } + /// + /// Test the property 'UidToken' + /// + [Fact] + public void UidTokenTest() + { + // TODO unit test for the property 'UidToken' + } + + } + +} diff --git a/src/akeyless.Test/Model/ListAcmeAccountsOutputTests.cs b/src/akeyless.Test/Model/ListAcmeAccountsOutputTests.cs new file mode 100644 index 0000000..1353fe7 --- /dev/null +++ b/src/akeyless.Test/Model/ListAcmeAccountsOutputTests.cs @@ -0,0 +1,71 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing ListAcmeAccountsOutput + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class ListAcmeAccountsOutputTests : IDisposable + { + // TODO uncomment below to declare an instance variable for ListAcmeAccountsOutput + //private ListAcmeAccountsOutput instance; + + public ListAcmeAccountsOutputTests() + { + // TODO uncomment below to create an instance of ListAcmeAccountsOutput + //instance = new ListAcmeAccountsOutput(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of ListAcmeAccountsOutput + /// + [Fact] + public void ListAcmeAccountsOutputInstanceTest() + { + // TODO uncomment below to test "IsType" ListAcmeAccountsOutput + //Assert.IsType(instance); + } + + + /// + /// Test the property 'Accounts' + /// + [Fact] + public void AccountsTest() + { + // TODO unit test for the property 'Accounts' + } + + } + +} diff --git a/src/akeyless.Test/Model/ListAcmeAccountsTests.cs b/src/akeyless.Test/Model/ListAcmeAccountsTests.cs new file mode 100644 index 0000000..ad03b0b --- /dev/null +++ b/src/akeyless.Test/Model/ListAcmeAccountsTests.cs @@ -0,0 +1,95 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using Xunit; + +using System; +using System.Linq; +using System.IO; +using System.Collections.Generic; +using akeyless.Api; +using akeyless.Model; +using akeyless.Client; +using System.Reflection; +using Newtonsoft.Json; + +namespace akeyless.Test.Model +{ + /// + /// Class for testing ListAcmeAccounts + /// + /// + /// This file is automatically generated by OpenAPI Generator (https://openapi-generator.tech). + /// Please update the test case below to test the model. + /// + public class ListAcmeAccountsTests : IDisposable + { + // TODO uncomment below to declare an instance variable for ListAcmeAccounts + //private ListAcmeAccounts instance; + + public ListAcmeAccountsTests() + { + // TODO uncomment below to create an instance of ListAcmeAccounts + //instance = new ListAcmeAccounts(); + } + + public void Dispose() + { + // Cleanup when everything is done. + } + + /// + /// Test an instance of ListAcmeAccounts + /// + [Fact] + public void ListAcmeAccountsInstanceTest() + { + // TODO uncomment below to test "IsType" ListAcmeAccounts + //Assert.IsType(instance); + } + + + /// + /// Test the property 'CertIssuerName' + /// + [Fact] + public void CertIssuerNameTest() + { + // TODO unit test for the property 'CertIssuerName' + } + /// + /// Test the property 'Json' + /// + [Fact] + public void JsonTest() + { + // TODO unit test for the property 'Json' + } + /// + /// Test the property 'Token' + /// + [Fact] + public void TokenTest() + { + // TODO unit test for the property 'Token' + } + /// + /// Test the property 'UidToken' + /// + [Fact] + public void UidTokenTest() + { + // TODO unit test for the property 'UidToken' + } + + } + +} diff --git a/src/akeyless/Api/V2Api.cs b/src/akeyless/Api/V2Api.cs index 01d918d..1f50a77 100644 --- a/src/akeyless/Api/V2Api.cs +++ b/src/akeyless/Api/V2Api.cs @@ -693,6 +693,26 @@ public interface IV2ApiSync : IApiAccessor /// Thrown when fails to make API call /// /// Index associated with the operation. + /// Object + Object ChangeAdminAccountPassword(ChangeAdminAccountPassword body, int operationIndex = 0); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of Object + ApiResponse ChangeAdminAccountPasswordWithHttpInfo(ChangeAdminAccountPassword body, int operationIndex = 0); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. /// ConfigureOutput ConfigureOutput Configure(Configure body, int operationIndex = 0); @@ -1833,6 +1853,26 @@ public interface IV2ApiSync : IApiAccessor /// Thrown when fails to make API call /// /// Index associated with the operation. + /// Object + Object DeactivateAcmeAccount(DeactivateAcmeAccount body, int operationIndex = 0); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of Object + ApiResponse DeactivateAcmeAccountWithHttpInfo(DeactivateAcmeAccount body, int operationIndex = 0); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. /// DecryptOutput DecryptOutput Decrypt(Decrypt body, int operationIndex = 0); @@ -6071,6 +6111,26 @@ public interface IV2ApiSync : IApiAccessor /// Thrown when fails to make API call /// /// Index associated with the operation. + /// GenerateAcmeEabOutput + GenerateAcmeEabOutput GenerateAcmeEab(GenerateAcmeEab body, int operationIndex = 0); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of GenerateAcmeEabOutput + ApiResponse GenerateAcmeEabWithHttpInfo(GenerateAcmeEab body, int operationIndex = 0); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. /// GenerateCsrOutput GenerateCsrOutput GenerateCsr(GenerateCsr body, int operationIndex = 0); @@ -6989,6 +7049,26 @@ public interface IV2ApiSync : IApiAccessor /// Thrown when fails to make API call /// /// Index associated with the operation. + /// ListAcmeAccountsOutput + ListAcmeAccountsOutput ListAcmeAccounts(ListAcmeAccounts body, int operationIndex = 0); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of ListAcmeAccountsOutput + ApiResponse ListAcmeAccountsWithHttpInfo(ListAcmeAccounts body, int operationIndex = 0); + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. /// ListAuthMethodsOutput ListAuthMethodsOutput ListAuthMethods(ListAuthMethods body, int operationIndex = 0); @@ -11903,6 +11983,31 @@ public interface IV2ApiAsync : IApiAccessor /// /// Index associated with the operation. /// Cancellation Token to cancel the request. + /// Task of Object + System.Threading.Tasks.Task ChangeAdminAccountPasswordAsync(ChangeAdminAccountPassword body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (Object) + System.Threading.Tasks.Task> ChangeAdminAccountPasswordWithHttpInfoAsync(ChangeAdminAccountPassword body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. /// Task of ConfigureOutput System.Threading.Tasks.Task ConfigureAsync(Configure body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); @@ -13328,6 +13433,31 @@ public interface IV2ApiAsync : IApiAccessor /// /// Index associated with the operation. /// Cancellation Token to cancel the request. + /// Task of Object + System.Threading.Tasks.Task DeactivateAcmeAccountAsync(DeactivateAcmeAccount body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (Object) + System.Threading.Tasks.Task> DeactivateAcmeAccountWithHttpInfoAsync(DeactivateAcmeAccount body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. /// Task of DecryptOutput System.Threading.Tasks.Task DecryptAsync(Decrypt body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); @@ -18626,6 +18756,31 @@ public interface IV2ApiAsync : IApiAccessor /// /// Index associated with the operation. /// Cancellation Token to cancel the request. + /// Task of GenerateAcmeEabOutput + System.Threading.Tasks.Task GenerateAcmeEabAsync(GenerateAcmeEab body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (GenerateAcmeEabOutput) + System.Threading.Tasks.Task> GenerateAcmeEabWithHttpInfoAsync(GenerateAcmeEab body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. /// Task of GenerateCsrOutput System.Threading.Tasks.Task GenerateCsrAsync(GenerateCsr body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); @@ -19774,6 +19929,31 @@ public interface IV2ApiAsync : IApiAccessor /// /// Index associated with the operation. /// Cancellation Token to cancel the request. + /// Task of ListAcmeAccountsOutput + System.Threading.Tasks.Task ListAcmeAccountsAsync(ListAcmeAccounts body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (ListAcmeAccountsOutput) + System.Threading.Tasks.Task> ListAcmeAccountsWithHttpInfoAsync(ListAcmeAccounts body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); + /// + /// + /// + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. /// Task of ListAuthMethodsOutput System.Threading.Tasks.Task ListAuthMethodsAsync(ListAuthMethods body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)); @@ -29798,6 +29978,152 @@ public akeyless.Client.ApiResponse AuthMethodUpdateUnive return localVarResponse; } + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Object + public Object ChangeAdminAccountPassword(ChangeAdminAccountPassword body, int operationIndex = 0) + { + akeyless.Client.ApiResponse localVarResponse = ChangeAdminAccountPasswordWithHttpInfo(body); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of Object + public akeyless.Client.ApiResponse ChangeAdminAccountPasswordWithHttpInfo(ChangeAdminAccountPassword body, int operationIndex = 0) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->ChangeAdminAccountPassword"); + } + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.ChangeAdminAccountPassword"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = this.Client.Post("/change-admin-account-password", localVarRequestOptions, this.Configuration); + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("ChangeAdminAccountPassword", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of Object + public async System.Threading.Tasks.Task ChangeAdminAccountPasswordAsync(ChangeAdminAccountPassword body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + akeyless.Client.ApiResponse localVarResponse = await ChangeAdminAccountPasswordWithHttpInfoAsync(body, operationIndex, cancellationToken).ConfigureAwait(false); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (Object) + public async System.Threading.Tasks.Task> ChangeAdminAccountPasswordWithHttpInfoAsync(ChangeAdminAccountPassword body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->ChangeAdminAccountPassword"); + } + + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.ChangeAdminAccountPassword"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = await this.AsynchronousClient.PostAsync("/change-admin-account-password", localVarRequestOptions, this.Configuration, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("ChangeAdminAccountPassword", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + /// /// /// @@ -38101,16 +38427,162 @@ public akeyless.Client.ApiResponse CreateldapTargetWithH localVarRequestOptions.Data = body; - localVarRequestOptions.Operation = "V2Api.CreateldapTarget"; + localVarRequestOptions.Operation = "V2Api.CreateldapTarget"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = await this.AsynchronousClient.PostAsync("/create-ldap-target", localVarRequestOptions, this.Configuration, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("CreateldapTarget", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Object + public Object DeactivateAcmeAccount(DeactivateAcmeAccount body, int operationIndex = 0) + { + akeyless.Client.ApiResponse localVarResponse = DeactivateAcmeAccountWithHttpInfo(body); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of Object + public akeyless.Client.ApiResponse DeactivateAcmeAccountWithHttpInfo(DeactivateAcmeAccount body, int operationIndex = 0) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->DeactivateAcmeAccount"); + } + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.DeactivateAcmeAccount"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = this.Client.Post("/deactivate-acme-account", localVarRequestOptions, this.Configuration); + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("DeactivateAcmeAccount", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of Object + public async System.Threading.Tasks.Task DeactivateAcmeAccountAsync(DeactivateAcmeAccount body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + akeyless.Client.ApiResponse localVarResponse = await DeactivateAcmeAccountWithHttpInfoAsync(body, operationIndex, cancellationToken).ConfigureAwait(false); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (Object) + public async System.Threading.Tasks.Task> DeactivateAcmeAccountWithHttpInfoAsync(DeactivateAcmeAccount body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->DeactivateAcmeAccount"); + } + + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.DeactivateAcmeAccount"; localVarRequestOptions.OperationIndex = operationIndex; // make the HTTP request - var localVarResponse = await this.AsynchronousClient.PostAsync("/create-ldap-target", localVarRequestOptions, this.Configuration, cancellationToken).ConfigureAwait(false); + var localVarResponse = await this.AsynchronousClient.PostAsync("/deactivate-acme-account", localVarRequestOptions, this.Configuration, cancellationToken).ConfigureAwait(false); if (this.ExceptionFactory != null) { - Exception _exception = this.ExceptionFactory("CreateldapTarget", localVarResponse); + Exception _exception = this.ExceptionFactory("DeactivateAcmeAccount", localVarResponse); if (_exception != null) { throw _exception; @@ -68984,6 +69456,152 @@ public akeyless.Client.ApiResponse GatewayUpdateTmpUsersWithHttpInfo(Gat return localVarResponse; } + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// GenerateAcmeEabOutput + public GenerateAcmeEabOutput GenerateAcmeEab(GenerateAcmeEab body, int operationIndex = 0) + { + akeyless.Client.ApiResponse localVarResponse = GenerateAcmeEabWithHttpInfo(body); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of GenerateAcmeEabOutput + public akeyless.Client.ApiResponse GenerateAcmeEabWithHttpInfo(GenerateAcmeEab body, int operationIndex = 0) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->GenerateAcmeEab"); + } + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.GenerateAcmeEab"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = this.Client.Post("/generate-acme-eab", localVarRequestOptions, this.Configuration); + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("GenerateAcmeEab", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of GenerateAcmeEabOutput + public async System.Threading.Tasks.Task GenerateAcmeEabAsync(GenerateAcmeEab body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + akeyless.Client.ApiResponse localVarResponse = await GenerateAcmeEabWithHttpInfoAsync(body, operationIndex, cancellationToken).ConfigureAwait(false); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (GenerateAcmeEabOutput) + public async System.Threading.Tasks.Task> GenerateAcmeEabWithHttpInfoAsync(GenerateAcmeEab body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->GenerateAcmeEab"); + } + + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.GenerateAcmeEab"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = await this.AsynchronousClient.PostAsync("/generate-acme-eab", localVarRequestOptions, this.Configuration, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("GenerateAcmeEab", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + /// /// /// @@ -75524,6 +76142,152 @@ public akeyless.Client.ApiResponse ImportPasswordsWithHtt return localVarResponse; } + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ListAcmeAccountsOutput + public ListAcmeAccountsOutput ListAcmeAccounts(ListAcmeAccounts body, int operationIndex = 0) + { + akeyless.Client.ApiResponse localVarResponse = ListAcmeAccountsWithHttpInfo(body); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// ApiResponse of ListAcmeAccountsOutput + public akeyless.Client.ApiResponse ListAcmeAccountsWithHttpInfo(ListAcmeAccounts body, int operationIndex = 0) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->ListAcmeAccounts"); + } + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.ListAcmeAccounts"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = this.Client.Post("/list-acme-accounts", localVarRequestOptions, this.Configuration); + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("ListAcmeAccounts", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ListAcmeAccountsOutput + public async System.Threading.Tasks.Task ListAcmeAccountsAsync(ListAcmeAccounts body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + akeyless.Client.ApiResponse localVarResponse = await ListAcmeAccountsWithHttpInfoAsync(body, operationIndex, cancellationToken).ConfigureAwait(false); + return localVarResponse.Data; + } + + /// + /// + /// + /// Thrown when fails to make API call + /// + /// Index associated with the operation. + /// Cancellation Token to cancel the request. + /// Task of ApiResponse (ListAcmeAccountsOutput) + public async System.Threading.Tasks.Task> ListAcmeAccountsWithHttpInfoAsync(ListAcmeAccounts body, int operationIndex = 0, System.Threading.CancellationToken cancellationToken = default(System.Threading.CancellationToken)) + { + // verify the required parameter 'body' is set + if (body == null) + { + throw new akeyless.Client.ApiException(400, "Missing required parameter 'body' when calling V2Api->ListAcmeAccounts"); + } + + + akeyless.Client.RequestOptions localVarRequestOptions = new akeyless.Client.RequestOptions(); + + string[] _contentTypes = new string[] { + "application/json" + }; + + // to determine the Accept header + string[] _accepts = new string[] { + "application/json" + }; + + var localVarContentType = akeyless.Client.ClientUtils.SelectHeaderContentType(_contentTypes); + if (localVarContentType != null) + { + localVarRequestOptions.HeaderParameters.Add("Content-Type", localVarContentType); + } + + var localVarAccept = akeyless.Client.ClientUtils.SelectHeaderAccept(_accepts); + if (localVarAccept != null) + { + localVarRequestOptions.HeaderParameters.Add("Accept", localVarAccept); + } + + localVarRequestOptions.Data = body; + + localVarRequestOptions.Operation = "V2Api.ListAcmeAccounts"; + localVarRequestOptions.OperationIndex = operationIndex; + + + // make the HTTP request + var localVarResponse = await this.AsynchronousClient.PostAsync("/list-acme-accounts", localVarRequestOptions, this.Configuration, cancellationToken).ConfigureAwait(false); + + if (this.ExceptionFactory != null) + { + Exception _exception = this.ExceptionFactory("ListAcmeAccounts", localVarResponse); + if (_exception != null) + { + throw _exception; + } + } + + return localVarResponse; + } + /// /// /// diff --git a/src/akeyless/Client/Configuration.cs b/src/akeyless/Client/Configuration.cs index b0a6f92..ef06384 100644 --- a/src/akeyless/Client/Configuration.cs +++ b/src/akeyless/Client/Configuration.cs @@ -33,7 +33,7 @@ public class Configuration : IReadableConfiguration /// Version of the package. /// /// Version of the package. - public const string Version = "4.2.4"; + public const string Version = "4.2.5"; /// /// Identifier for ISO 8601 DateTime Format @@ -115,7 +115,7 @@ public class Configuration : IReadableConfiguration public Configuration() { Proxy = null; - UserAgent = WebUtility.UrlEncode("OpenAPI-Generator/4.2.4/csharp"); + UserAgent = WebUtility.UrlEncode("OpenAPI-Generator/4.2.5/csharp"); BasePath = "https://api.akeyless.io"; DefaultHeaders = new ConcurrentDictionary(); ApiKey = new ConcurrentDictionary(); @@ -523,7 +523,7 @@ public static string ToDebugReport() report += " OS: " + System.Environment.OSVersion + "\n"; report += " .NET Framework Version: " + System.Environment.Version + "\n"; report += " Version of the API: 2.0\n"; - report += " SDK Package Version: 4.2.4\n"; + report += " SDK Package Version: 4.2.5\n"; return report; } diff --git a/src/akeyless/Model/AcmeAccount.cs b/src/akeyless/Model/AcmeAccount.cs new file mode 100644 index 0000000..78f4618 --- /dev/null +++ b/src/akeyless/Model/AcmeAccount.cs @@ -0,0 +1,166 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// AcmeAccount is copied without the jwk as it seems like it has issues with sdk + /// + [DataContract(Name = "AcmeAccount")] + public partial class AcmeAccount : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + /// AccountId is the ACME account id, not Akeyless account id. + /// keyDigest. + /// status. + public AcmeAccount(string accountId = default(string), string keyDigest = default(string), string status = default(string)) + { + this.AccountId = accountId; + this.KeyDigest = keyDigest; + this.Status = status; + } + + /// + /// AccountId is the ACME account id, not Akeyless account id + /// + /// AccountId is the ACME account id, not Akeyless account id + [DataMember(Name = "account_id", EmitDefaultValue = false)] + public string AccountId { get; set; } + + /// + /// Gets or Sets KeyDigest + /// + [DataMember(Name = "key_digest", EmitDefaultValue = false)] + public string KeyDigest { get; set; } + + /// + /// Gets or Sets Status + /// + [DataMember(Name = "status", EmitDefaultValue = false)] + public string Status { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class AcmeAccount {\n"); + sb.Append(" AccountId: ").Append(AccountId).Append("\n"); + sb.Append(" KeyDigest: ").Append(KeyDigest).Append("\n"); + sb.Append(" Status: ").Append(Status).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as AcmeAccount); + } + + /// + /// Returns true if AcmeAccount instances are equal + /// + /// Instance of AcmeAccount to be compared + /// Boolean + public bool Equals(AcmeAccount input) + { + if (input == null) + { + return false; + } + return + ( + this.AccountId == input.AccountId || + (this.AccountId != null && + this.AccountId.Equals(input.AccountId)) + ) && + ( + this.KeyDigest == input.KeyDigest || + (this.KeyDigest != null && + this.KeyDigest.Equals(input.KeyDigest)) + ) && + ( + this.Status == input.Status || + (this.Status != null && + this.Status.Equals(input.Status)) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.AccountId != null) + { + hashCode = (hashCode * 59) + this.AccountId.GetHashCode(); + } + if (this.KeyDigest != null) + { + hashCode = (hashCode * 59) + this.KeyDigest.GetHashCode(); + } + if (this.Status != null) + { + hashCode = (hashCode * 59) + this.Status.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/AuthMethodRoleAssociation.cs b/src/akeyless/Model/AuthMethodRoleAssociation.cs index cab1901..07c3668 100644 --- a/src/akeyless/Model/AuthMethodRoleAssociation.cs +++ b/src/akeyless/Model/AuthMethodRoleAssociation.cs @@ -39,14 +39,16 @@ public partial class AuthMethodRoleAssociation : IEquatableassocId. /// authMethodSubClaims. /// isSubClaimsCaseSensitive. + /// isSubclaimsWithOperator. /// roleName. /// rules. - public AuthMethodRoleAssociation(List allowedOps = default(List), string assocId = default(string), Dictionary> authMethodSubClaims = default(Dictionary>), bool isSubClaimsCaseSensitive = default(bool), string roleName = default(string), Rules rules = default(Rules)) + public AuthMethodRoleAssociation(List allowedOps = default(List), string assocId = default(string), Dictionary> authMethodSubClaims = default(Dictionary>), bool isSubClaimsCaseSensitive = default(bool), bool isSubclaimsWithOperator = default(bool), string roleName = default(string), Rules rules = default(Rules)) { this.AllowedOps = allowedOps; this.AssocId = assocId; this.AuthMethodSubClaims = authMethodSubClaims; this.IsSubClaimsCaseSensitive = isSubClaimsCaseSensitive; + this.IsSubclaimsWithOperator = isSubclaimsWithOperator; this.RoleName = roleName; this.Rules = rules; } @@ -75,6 +77,12 @@ public partial class AuthMethodRoleAssociation : IEquatable + /// Gets or Sets IsSubclaimsWithOperator + /// + [DataMember(Name = "is_subclaims_with_operator", EmitDefaultValue = true)] + public bool IsSubclaimsWithOperator { get; set; } + /// /// Gets or Sets RoleName /// @@ -99,6 +107,7 @@ public override string ToString() sb.Append(" AssocId: ").Append(AssocId).Append("\n"); sb.Append(" AuthMethodSubClaims: ").Append(AuthMethodSubClaims).Append("\n"); sb.Append(" IsSubClaimsCaseSensitive: ").Append(IsSubClaimsCaseSensitive).Append("\n"); + sb.Append(" IsSubclaimsWithOperator: ").Append(IsSubclaimsWithOperator).Append("\n"); sb.Append(" RoleName: ").Append(RoleName).Append("\n"); sb.Append(" Rules: ").Append(Rules).Append("\n"); sb.Append("}\n"); @@ -157,6 +166,10 @@ public bool Equals(AuthMethodRoleAssociation input) this.IsSubClaimsCaseSensitive == input.IsSubClaimsCaseSensitive || this.IsSubClaimsCaseSensitive.Equals(input.IsSubClaimsCaseSensitive) ) && + ( + this.IsSubclaimsWithOperator == input.IsSubclaimsWithOperator || + this.IsSubclaimsWithOperator.Equals(input.IsSubclaimsWithOperator) + ) && ( this.RoleName == input.RoleName || (this.RoleName != null && @@ -191,6 +204,7 @@ public override int GetHashCode() hashCode = (hashCode * 59) + this.AuthMethodSubClaims.GetHashCode(); } hashCode = (hashCode * 59) + this.IsSubClaimsCaseSensitive.GetHashCode(); + hashCode = (hashCode * 59) + this.IsSubclaimsWithOperator.GetHashCode(); if (this.RoleName != null) { hashCode = (hashCode * 59) + this.RoleName.GetHashCode(); diff --git a/src/akeyless/Model/ChangeAdminAccountPassword.cs b/src/akeyless/Model/ChangeAdminAccountPassword.cs new file mode 100644 index 0000000..c714bea --- /dev/null +++ b/src/akeyless/Model/ChangeAdminAccountPassword.cs @@ -0,0 +1,217 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// ChangeAdminAccountPassword + /// + [DataContract(Name = "changeAdminAccountPassword")] + public partial class ChangeAdminAccountPassword : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + [JsonConstructorAttribute] + protected ChangeAdminAccountPassword() { } + /// + /// Initializes a new instance of the class. + /// + /// Current password (required). + /// Set output format to JSON (default to false). + /// New password (required). + /// Authentication token (see `/auth` and `/configure`). + /// The universal identity token, Required only for universal_identity authentication. + public ChangeAdminAccountPassword(string currentPassword = default(string), bool json = false, string newPassword = default(string), string token = default(string), string uidToken = default(string)) + { + // to ensure "currentPassword" is required (not null) + if (currentPassword == null) + { + throw new ArgumentNullException("currentPassword is a required property for ChangeAdminAccountPassword and cannot be null"); + } + this.CurrentPassword = currentPassword; + // to ensure "newPassword" is required (not null) + if (newPassword == null) + { + throw new ArgumentNullException("newPassword is a required property for ChangeAdminAccountPassword and cannot be null"); + } + this.NewPassword = newPassword; + this.Json = json; + this.Token = token; + this.UidToken = uidToken; + } + + /// + /// Current password + /// + /// Current password + [DataMember(Name = "current-password", IsRequired = true, EmitDefaultValue = true)] + public string CurrentPassword { get; set; } + + /// + /// Set output format to JSON + /// + /// Set output format to JSON + [DataMember(Name = "json", EmitDefaultValue = true)] + public bool Json { get; set; } + + /// + /// New password + /// + /// New password + [DataMember(Name = "new-password", IsRequired = true, EmitDefaultValue = true)] + public string NewPassword { get; set; } + + /// + /// Authentication token (see `/auth` and `/configure`) + /// + /// Authentication token (see `/auth` and `/configure`) + [DataMember(Name = "token", EmitDefaultValue = false)] + public string Token { get; set; } + + /// + /// The universal identity token, Required only for universal_identity authentication + /// + /// The universal identity token, Required only for universal_identity authentication + [DataMember(Name = "uid-token", EmitDefaultValue = false)] + public string UidToken { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class ChangeAdminAccountPassword {\n"); + sb.Append(" CurrentPassword: ").Append(CurrentPassword).Append("\n"); + sb.Append(" Json: ").Append(Json).Append("\n"); + sb.Append(" NewPassword: ").Append(NewPassword).Append("\n"); + sb.Append(" Token: ").Append(Token).Append("\n"); + sb.Append(" UidToken: ").Append(UidToken).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as ChangeAdminAccountPassword); + } + + /// + /// Returns true if ChangeAdminAccountPassword instances are equal + /// + /// Instance of ChangeAdminAccountPassword to be compared + /// Boolean + public bool Equals(ChangeAdminAccountPassword input) + { + if (input == null) + { + return false; + } + return + ( + this.CurrentPassword == input.CurrentPassword || + (this.CurrentPassword != null && + this.CurrentPassword.Equals(input.CurrentPassword)) + ) && + ( + this.Json == input.Json || + this.Json.Equals(input.Json) + ) && + ( + this.NewPassword == input.NewPassword || + (this.NewPassword != null && + this.NewPassword.Equals(input.NewPassword)) + ) && + ( + this.Token == input.Token || + (this.Token != null && + this.Token.Equals(input.Token)) + ) && + ( + this.UidToken == input.UidToken || + (this.UidToken != null && + this.UidToken.Equals(input.UidToken)) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.CurrentPassword != null) + { + hashCode = (hashCode * 59) + this.CurrentPassword.GetHashCode(); + } + hashCode = (hashCode * 59) + this.Json.GetHashCode(); + if (this.NewPassword != null) + { + hashCode = (hashCode * 59) + this.NewPassword.GetHashCode(); + } + if (this.Token != null) + { + hashCode = (hashCode * 59) + this.Token.GetHashCode(); + } + if (this.UidToken != null) + { + hashCode = (hashCode * 59) + this.UidToken.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/CreatePKICertIssuer.cs b/src/akeyless/Model/CreatePKICertIssuer.cs index 1b01ef3..fe387ae 100644 --- a/src/akeyless/Model/CreatePKICertIssuer.cs +++ b/src/akeyless/Model/CreatePKICertIssuer.cs @@ -52,11 +52,13 @@ protected CreatePKICertIssuer() { } /// A comma-separated list of countries that will be set in the issued certificate. /// Set this to allow the issuer will expose a CRL endpoint in the Gateway. /// Set this to allow the cert issuer will expose a public CRL endpoint. + /// Mark key usage as critical [true/false] (default to "true"). /// Protection from accidental deletion of this object [true/false]. /// Description of the object. /// A path in which to save generated certificates. + /// If set, the cert issuer will support the acme protocol. /// How many days before the expiration of the certificate would you like to be notified.. - /// The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA. + /// The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME. /// If set, the basic constraints extension will be added to certificate. /// Set output format to JSON (default to false). /// key-usage (default to "DigitalSignature,KeyAgreement,KeyEncipherment"). @@ -77,7 +79,7 @@ protected CreatePKICertIssuer() { } /// Authentication token (see `/auth` and `/configure`). /// The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs (required). /// The universal identity token, Required only for universal_identity authentication. - public CreatePKICertIssuer(bool allowAnyName = default(bool), bool allowCopyExtFromCsr = default(bool), bool allowSubdomains = default(bool), string allowedDomains = default(string), string allowedExtraExtensions = default(string), string allowedUriSans = default(string), string caTarget = default(string), bool clientFlag = default(bool), bool codeSigningFlag = default(bool), string country = default(string), bool createPrivateCrl = default(bool), bool createPublicCrl = default(bool), string deleteProtection = default(string), string description = default(string), string destinationPath = default(string), List expirationEventIn = default(List), string gwClusterUrl = default(string), bool isCa = default(bool), bool json = false, string keyUsage = "DigitalSignature,KeyAgreement,KeyEncipherment", string locality = default(string), string metadata = default(string), string name = default(string), bool notEnforceHostnames = default(bool), bool notRequireCn = default(bool), string organizationalUnits = default(string), string organizations = default(string), string postalCode = default(string), bool protectCertificates = default(bool), string province = default(string), bool serverFlag = default(bool), string signerKeyName = "dummy_signer_key", string streetAddress = default(string), List tag = default(List), string token = default(string), string ttl = default(string), string uidToken = default(string)) + public CreatePKICertIssuer(bool allowAnyName = default(bool), bool allowCopyExtFromCsr = default(bool), bool allowSubdomains = default(bool), string allowedDomains = default(string), string allowedExtraExtensions = default(string), string allowedUriSans = default(string), string caTarget = default(string), bool clientFlag = default(bool), bool codeSigningFlag = default(bool), string country = default(string), bool createPrivateCrl = default(bool), bool createPublicCrl = default(bool), string criticalKeyUsage = "true", string deleteProtection = default(string), string description = default(string), string destinationPath = default(string), bool enableAcme = default(bool), List expirationEventIn = default(List), string gwClusterUrl = default(string), bool isCa = default(bool), bool json = false, string keyUsage = "DigitalSignature,KeyAgreement,KeyEncipherment", string locality = default(string), string metadata = default(string), string name = default(string), bool notEnforceHostnames = default(bool), bool notRequireCn = default(bool), string organizationalUnits = default(string), string organizations = default(string), string postalCode = default(string), bool protectCertificates = default(bool), string province = default(string), bool serverFlag = default(bool), string signerKeyName = "dummy_signer_key", string streetAddress = default(string), List tag = default(List), string token = default(string), string ttl = default(string), string uidToken = default(string)) { // to ensure "name" is required (not null) if (name == null) @@ -109,9 +111,12 @@ protected CreatePKICertIssuer() { } this.Country = country; this.CreatePrivateCrl = createPrivateCrl; this.CreatePublicCrl = createPublicCrl; + // use default value if no "criticalKeyUsage" provided + this.CriticalKeyUsage = criticalKeyUsage ?? "true"; this.DeleteProtection = deleteProtection; this.Description = description; this.DestinationPath = destinationPath; + this.EnableAcme = enableAcme; this.ExpirationEventIn = expirationEventIn; this.GwClusterUrl = gwClusterUrl; this.IsCa = isCa; @@ -218,6 +223,13 @@ protected CreatePKICertIssuer() { } [DataMember(Name = "create-public-crl", EmitDefaultValue = true)] public bool CreatePublicCrl { get; set; } + /// + /// Mark key usage as critical [true/false] + /// + /// Mark key usage as critical [true/false] + [DataMember(Name = "critical-key-usage", EmitDefaultValue = false)] + public string CriticalKeyUsage { get; set; } + /// /// Protection from accidental deletion of this object [true/false] /// @@ -239,6 +251,13 @@ protected CreatePKICertIssuer() { } [DataMember(Name = "destination-path", EmitDefaultValue = false)] public string DestinationPath { get; set; } + /// + /// If set, the cert issuer will support the acme protocol + /// + /// If set, the cert issuer will support the acme protocol + [DataMember(Name = "enable-acme", EmitDefaultValue = true)] + public bool EnableAcme { get; set; } + /// /// How many days before the expiration of the certificate would you like to be notified. /// @@ -247,9 +266,9 @@ protected CreatePKICertIssuer() { } public List ExpirationEventIn { get; set; } /// - /// The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA + /// The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME /// - /// The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA + /// The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME [DataMember(Name = "gw-cluster-url", EmitDefaultValue = false)] public string GwClusterUrl { get; set; } @@ -413,9 +432,11 @@ public override string ToString() sb.Append(" Country: ").Append(Country).Append("\n"); sb.Append(" CreatePrivateCrl: ").Append(CreatePrivateCrl).Append("\n"); sb.Append(" CreatePublicCrl: ").Append(CreatePublicCrl).Append("\n"); + sb.Append(" CriticalKeyUsage: ").Append(CriticalKeyUsage).Append("\n"); sb.Append(" DeleteProtection: ").Append(DeleteProtection).Append("\n"); sb.Append(" Description: ").Append(Description).Append("\n"); sb.Append(" DestinationPath: ").Append(DestinationPath).Append("\n"); + sb.Append(" EnableAcme: ").Append(EnableAcme).Append("\n"); sb.Append(" ExpirationEventIn: ").Append(ExpirationEventIn).Append("\n"); sb.Append(" GwClusterUrl: ").Append(GwClusterUrl).Append("\n"); sb.Append(" IsCa: ").Append(IsCa).Append("\n"); @@ -526,6 +547,11 @@ public bool Equals(CreatePKICertIssuer input) this.CreatePublicCrl == input.CreatePublicCrl || this.CreatePublicCrl.Equals(input.CreatePublicCrl) ) && + ( + this.CriticalKeyUsage == input.CriticalKeyUsage || + (this.CriticalKeyUsage != null && + this.CriticalKeyUsage.Equals(input.CriticalKeyUsage)) + ) && ( this.DeleteProtection == input.DeleteProtection || (this.DeleteProtection != null && @@ -541,6 +567,10 @@ public bool Equals(CreatePKICertIssuer input) (this.DestinationPath != null && this.DestinationPath.Equals(input.DestinationPath)) ) && + ( + this.EnableAcme == input.EnableAcme || + this.EnableAcme.Equals(input.EnableAcme) + ) && ( this.ExpirationEventIn == input.ExpirationEventIn || this.ExpirationEventIn != null && @@ -685,6 +715,10 @@ public override int GetHashCode() } hashCode = (hashCode * 59) + this.CreatePrivateCrl.GetHashCode(); hashCode = (hashCode * 59) + this.CreatePublicCrl.GetHashCode(); + if (this.CriticalKeyUsage != null) + { + hashCode = (hashCode * 59) + this.CriticalKeyUsage.GetHashCode(); + } if (this.DeleteProtection != null) { hashCode = (hashCode * 59) + this.DeleteProtection.GetHashCode(); @@ -697,6 +731,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.DestinationPath.GetHashCode(); } + hashCode = (hashCode * 59) + this.EnableAcme.GetHashCode(); if (this.ExpirationEventIn != null) { hashCode = (hashCode * 59) + this.ExpirationEventIn.GetHashCode(); diff --git a/src/akeyless/Model/DeactivateAcmeAccount.cs b/src/akeyless/Model/DeactivateAcmeAccount.cs new file mode 100644 index 0000000..da40897 --- /dev/null +++ b/src/akeyless/Model/DeactivateAcmeAccount.cs @@ -0,0 +1,232 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// deactivateAcmeAccount is a command that Deactivates \\ Deletes an acme external account + /// + [DataContract(Name = "deactivateAcmeAccount")] + public partial class DeactivateAcmeAccount : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + [JsonConstructorAttribute] + protected DeactivateAcmeAccount() { } + /// + /// Initializes a new instance of the class. + /// + /// The acme account id to deactivate (required). + /// The name of the PKI certificate issuer (required). + /// Delete the account. + /// Set output format to JSON (default to false). + /// Authentication token (see `/auth` and `/configure`). + /// The universal identity token, Required only for universal_identity authentication. + public DeactivateAcmeAccount(string acmeAccountId = default(string), string certIssuerName = default(string), bool deleteAccount = default(bool), bool json = false, string token = default(string), string uidToken = default(string)) + { + // to ensure "acmeAccountId" is required (not null) + if (acmeAccountId == null) + { + throw new ArgumentNullException("acmeAccountId is a required property for DeactivateAcmeAccount and cannot be null"); + } + this.AcmeAccountId = acmeAccountId; + // to ensure "certIssuerName" is required (not null) + if (certIssuerName == null) + { + throw new ArgumentNullException("certIssuerName is a required property for DeactivateAcmeAccount and cannot be null"); + } + this.CertIssuerName = certIssuerName; + this.DeleteAccount = deleteAccount; + this.Json = json; + this.Token = token; + this.UidToken = uidToken; + } + + /// + /// The acme account id to deactivate + /// + /// The acme account id to deactivate + [DataMember(Name = "acme-account-id", IsRequired = true, EmitDefaultValue = true)] + public string AcmeAccountId { get; set; } + + /// + /// The name of the PKI certificate issuer + /// + /// The name of the PKI certificate issuer + [DataMember(Name = "cert-issuer-name", IsRequired = true, EmitDefaultValue = true)] + public string CertIssuerName { get; set; } + + /// + /// Delete the account + /// + /// Delete the account + [DataMember(Name = "delete-account", EmitDefaultValue = true)] + public bool DeleteAccount { get; set; } + + /// + /// Set output format to JSON + /// + /// Set output format to JSON + [DataMember(Name = "json", EmitDefaultValue = true)] + public bool Json { get; set; } + + /// + /// Authentication token (see `/auth` and `/configure`) + /// + /// Authentication token (see `/auth` and `/configure`) + [DataMember(Name = "token", EmitDefaultValue = false)] + public string Token { get; set; } + + /// + /// The universal identity token, Required only for universal_identity authentication + /// + /// The universal identity token, Required only for universal_identity authentication + [DataMember(Name = "uid-token", EmitDefaultValue = false)] + public string UidToken { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class DeactivateAcmeAccount {\n"); + sb.Append(" AcmeAccountId: ").Append(AcmeAccountId).Append("\n"); + sb.Append(" CertIssuerName: ").Append(CertIssuerName).Append("\n"); + sb.Append(" DeleteAccount: ").Append(DeleteAccount).Append("\n"); + sb.Append(" Json: ").Append(Json).Append("\n"); + sb.Append(" Token: ").Append(Token).Append("\n"); + sb.Append(" UidToken: ").Append(UidToken).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as DeactivateAcmeAccount); + } + + /// + /// Returns true if DeactivateAcmeAccount instances are equal + /// + /// Instance of DeactivateAcmeAccount to be compared + /// Boolean + public bool Equals(DeactivateAcmeAccount input) + { + if (input == null) + { + return false; + } + return + ( + this.AcmeAccountId == input.AcmeAccountId || + (this.AcmeAccountId != null && + this.AcmeAccountId.Equals(input.AcmeAccountId)) + ) && + ( + this.CertIssuerName == input.CertIssuerName || + (this.CertIssuerName != null && + this.CertIssuerName.Equals(input.CertIssuerName)) + ) && + ( + this.DeleteAccount == input.DeleteAccount || + this.DeleteAccount.Equals(input.DeleteAccount) + ) && + ( + this.Json == input.Json || + this.Json.Equals(input.Json) + ) && + ( + this.Token == input.Token || + (this.Token != null && + this.Token.Equals(input.Token)) + ) && + ( + this.UidToken == input.UidToken || + (this.UidToken != null && + this.UidToken.Equals(input.UidToken)) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.AcmeAccountId != null) + { + hashCode = (hashCode * 59) + this.AcmeAccountId.GetHashCode(); + } + if (this.CertIssuerName != null) + { + hashCode = (hashCode * 59) + this.CertIssuerName.GetHashCode(); + } + hashCode = (hashCode * 59) + this.DeleteAccount.GetHashCode(); + hashCode = (hashCode * 59) + this.Json.GetHashCode(); + if (this.Token != null) + { + hashCode = (hashCode * 59) + this.Token.GetHashCode(); + } + if (this.UidToken != null) + { + hashCode = (hashCode * 59) + this.UidToken.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/GenerateAcmeEab.cs b/src/akeyless/Model/GenerateAcmeEab.cs new file mode 100644 index 0000000..febccfb --- /dev/null +++ b/src/akeyless/Model/GenerateAcmeEab.cs @@ -0,0 +1,193 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// GenerateAcmeEab + /// + [DataContract(Name = "generateAcmeEab")] + public partial class GenerateAcmeEab : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + [JsonConstructorAttribute] + protected GenerateAcmeEab() { } + /// + /// Initializes a new instance of the class. + /// + /// The name of the PKI certificate issuer (required). + /// Set output format to JSON (default to false). + /// Authentication token (see `/auth` and `/configure`). + /// The universal identity token, Required only for universal_identity authentication. + public GenerateAcmeEab(string certIssuerName = default(string), bool json = false, string token = default(string), string uidToken = default(string)) + { + // to ensure "certIssuerName" is required (not null) + if (certIssuerName == null) + { + throw new ArgumentNullException("certIssuerName is a required property for GenerateAcmeEab and cannot be null"); + } + this.CertIssuerName = certIssuerName; + this.Json = json; + this.Token = token; + this.UidToken = uidToken; + } + + /// + /// The name of the PKI certificate issuer + /// + /// The name of the PKI certificate issuer + [DataMember(Name = "cert-issuer-name", IsRequired = true, EmitDefaultValue = true)] + public string CertIssuerName { get; set; } + + /// + /// Set output format to JSON + /// + /// Set output format to JSON + [DataMember(Name = "json", EmitDefaultValue = true)] + public bool Json { get; set; } + + /// + /// Authentication token (see `/auth` and `/configure`) + /// + /// Authentication token (see `/auth` and `/configure`) + [DataMember(Name = "token", EmitDefaultValue = false)] + public string Token { get; set; } + + /// + /// The universal identity token, Required only for universal_identity authentication + /// + /// The universal identity token, Required only for universal_identity authentication + [DataMember(Name = "uid-token", EmitDefaultValue = false)] + public string UidToken { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class GenerateAcmeEab {\n"); + sb.Append(" CertIssuerName: ").Append(CertIssuerName).Append("\n"); + sb.Append(" Json: ").Append(Json).Append("\n"); + sb.Append(" Token: ").Append(Token).Append("\n"); + sb.Append(" UidToken: ").Append(UidToken).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as GenerateAcmeEab); + } + + /// + /// Returns true if GenerateAcmeEab instances are equal + /// + /// Instance of GenerateAcmeEab to be compared + /// Boolean + public bool Equals(GenerateAcmeEab input) + { + if (input == null) + { + return false; + } + return + ( + this.CertIssuerName == input.CertIssuerName || + (this.CertIssuerName != null && + this.CertIssuerName.Equals(input.CertIssuerName)) + ) && + ( + this.Json == input.Json || + this.Json.Equals(input.Json) + ) && + ( + this.Token == input.Token || + (this.Token != null && + this.Token.Equals(input.Token)) + ) && + ( + this.UidToken == input.UidToken || + (this.UidToken != null && + this.UidToken.Equals(input.UidToken)) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.CertIssuerName != null) + { + hashCode = (hashCode * 59) + this.CertIssuerName.GetHashCode(); + } + hashCode = (hashCode * 59) + this.Json.GetHashCode(); + if (this.Token != null) + { + hashCode = (hashCode * 59) + this.Token.GetHashCode(); + } + if (this.UidToken != null) + { + hashCode = (hashCode * 59) + this.UidToken.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/GenerateAcmeEabOutput.cs b/src/akeyless/Model/GenerateAcmeEabOutput.cs new file mode 100644 index 0000000..274d970 --- /dev/null +++ b/src/akeyless/Model/GenerateAcmeEabOutput.cs @@ -0,0 +1,165 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// GenerateAcmeEabOutput + /// + [DataContract(Name = "GenerateAcmeEabOutput")] + public partial class GenerateAcmeEabOutput : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + /// expiresAt. + /// kid. + /// macKey. + public GenerateAcmeEabOutput(DateTime expiresAt = default(DateTime), string kid = default(string), string macKey = default(string)) + { + this.ExpiresAt = expiresAt; + this.Kid = kid; + this.MacKey = macKey; + } + + /// + /// Gets or Sets ExpiresAt + /// + [DataMember(Name = "expires_at", EmitDefaultValue = false)] + public DateTime ExpiresAt { get; set; } + + /// + /// Gets or Sets Kid + /// + [DataMember(Name = "kid", EmitDefaultValue = false)] + public string Kid { get; set; } + + /// + /// Gets or Sets MacKey + /// + [DataMember(Name = "mac_key", EmitDefaultValue = false)] + public string MacKey { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class GenerateAcmeEabOutput {\n"); + sb.Append(" ExpiresAt: ").Append(ExpiresAt).Append("\n"); + sb.Append(" Kid: ").Append(Kid).Append("\n"); + sb.Append(" MacKey: ").Append(MacKey).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as GenerateAcmeEabOutput); + } + + /// + /// Returns true if GenerateAcmeEabOutput instances are equal + /// + /// Instance of GenerateAcmeEabOutput to be compared + /// Boolean + public bool Equals(GenerateAcmeEabOutput input) + { + if (input == null) + { + return false; + } + return + ( + this.ExpiresAt == input.ExpiresAt || + (this.ExpiresAt != null && + this.ExpiresAt.Equals(input.ExpiresAt)) + ) && + ( + this.Kid == input.Kid || + (this.Kid != null && + this.Kid.Equals(input.Kid)) + ) && + ( + this.MacKey == input.MacKey || + (this.MacKey != null && + this.MacKey.Equals(input.MacKey)) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.ExpiresAt != null) + { + hashCode = (hashCode * 59) + this.ExpiresAt.GetHashCode(); + } + if (this.Kid != null) + { + hashCode = (hashCode * 59) + this.Kid.GetHashCode(); + } + if (this.MacKey != null) + { + hashCode = (hashCode * 59) + this.MacKey.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/GetGroupOutput.cs b/src/akeyless/Model/GetGroupOutput.cs index 87a7807..03a5253 100644 --- a/src/akeyless/Model/GetGroupOutput.cs +++ b/src/akeyless/Model/GetGroupOutput.cs @@ -41,9 +41,10 @@ public partial class GetGroupOutput : IEquatable, IValidatableOb /// groupAlias. /// groupId. /// groupName. + /// isSubclaimsWithOperator. /// modificationDate. /// userAssignments. - public GetGroupOutput(string accountId = default(string), DateTime creationDate = default(DateTime), string description = default(string), string groupAlias = default(string), string groupId = default(string), string groupName = default(string), DateTime modificationDate = default(DateTime), List userAssignments = default(List)) + public GetGroupOutput(string accountId = default(string), DateTime creationDate = default(DateTime), string description = default(string), string groupAlias = default(string), string groupId = default(string), string groupName = default(string), bool isSubclaimsWithOperator = default(bool), DateTime modificationDate = default(DateTime), List userAssignments = default(List)) { this.AccountId = accountId; this.CreationDate = creationDate; @@ -51,6 +52,7 @@ public partial class GetGroupOutput : IEquatable, IValidatableOb this.GroupAlias = groupAlias; this.GroupId = groupId; this.GroupName = groupName; + this.IsSubclaimsWithOperator = isSubclaimsWithOperator; this.ModificationDate = modificationDate; this.UserAssignments = userAssignments; } @@ -91,6 +93,12 @@ public partial class GetGroupOutput : IEquatable, IValidatableOb [DataMember(Name = "group_name", EmitDefaultValue = false)] public string GroupName { get; set; } + /// + /// Gets or Sets IsSubclaimsWithOperator + /// + [DataMember(Name = "is_subclaims_with_operator", EmitDefaultValue = true)] + public bool IsSubclaimsWithOperator { get; set; } + /// /// Gets or Sets ModificationDate /// @@ -117,6 +125,7 @@ public override string ToString() sb.Append(" GroupAlias: ").Append(GroupAlias).Append("\n"); sb.Append(" GroupId: ").Append(GroupId).Append("\n"); sb.Append(" GroupName: ").Append(GroupName).Append("\n"); + sb.Append(" IsSubclaimsWithOperator: ").Append(IsSubclaimsWithOperator).Append("\n"); sb.Append(" ModificationDate: ").Append(ModificationDate).Append("\n"); sb.Append(" UserAssignments: ").Append(UserAssignments).Append("\n"); sb.Append("}\n"); @@ -184,6 +193,10 @@ public bool Equals(GetGroupOutput input) (this.GroupName != null && this.GroupName.Equals(input.GroupName)) ) && + ( + this.IsSubclaimsWithOperator == input.IsSubclaimsWithOperator || + this.IsSubclaimsWithOperator.Equals(input.IsSubclaimsWithOperator) + ) && ( this.ModificationDate == input.ModificationDate || (this.ModificationDate != null && @@ -230,6 +243,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.GroupName.GetHashCode(); } + hashCode = (hashCode * 59) + this.IsSubclaimsWithOperator.GetHashCode(); if (this.ModificationDate != null) { hashCode = (hashCode * 59) + this.ModificationDate.GetHashCode(); diff --git a/src/akeyless/Model/GetKubeExecCreds.cs b/src/akeyless/Model/GetKubeExecCreds.cs index e5013c6..bea17fb 100644 --- a/src/akeyless/Model/GetKubeExecCreds.cs +++ b/src/akeyless/Model/GetKubeExecCreds.cs @@ -45,7 +45,7 @@ protected GetKubeExecCreds() { } /// The name of the PKI certificate issuer (required). /// The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken). /// Certificate Signing Request contents encoded in base64 to generate the certificate with. - /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'.. + /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical. /// A json string that defines the requested extra extensions for the certificate. /// Set output format to JSON (default to false). /// PKI key file contents. If this option is used, the certificate will be printed to stdout. @@ -112,9 +112,9 @@ protected GetKubeExecCreds() { } public string CsrDataBase64 { get; set; } /// - /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. + /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical /// - /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. + /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical [DataMember(Name = "extended-key-usage", EmitDefaultValue = false)] public string ExtendedKeyUsage { get; set; } diff --git a/src/akeyless/Model/GetPKICertificate.cs b/src/akeyless/Model/GetPKICertificate.cs index dd8d54a..dd4fa25 100644 --- a/src/akeyless/Model/GetPKICertificate.cs +++ b/src/akeyless/Model/GetPKICertificate.cs @@ -44,7 +44,7 @@ protected GetPKICertificate() { } /// The name of the PKI certificate issuer (required). /// The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken). /// Certificate Signing Request contents encoded in base64 to generate the certificate with. - /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'.. + /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical. /// A json string that defines the requested extra extensions for the certificate. /// Set output format to JSON (default to false). /// PKI key file contents. If this option is used, the certificate will be printed to stdout. @@ -102,9 +102,9 @@ protected GetPKICertificate() { } public string CsrDataBase64 { get; set; } /// - /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. + /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical /// - /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. + /// A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical [DataMember(Name = "extended-key-usage", EmitDefaultValue = false)] public string ExtendedKeyUsage { get; set; } diff --git a/src/akeyless/Model/Group.cs b/src/akeyless/Model/Group.cs index 1f9b824..5560f68 100644 --- a/src/akeyless/Model/Group.cs +++ b/src/akeyless/Model/Group.cs @@ -41,9 +41,10 @@ public partial class Group : IEquatable, IValidatableObject /// groupAlias. /// groupId. /// groupName. + /// isSubclaimsWithOperator. /// modificationDate. /// userAssignments. - public Group(string accountId = default(string), DateTime creationDate = default(DateTime), string description = default(string), string groupAlias = default(string), string groupId = default(string), string groupName = default(string), DateTime modificationDate = default(DateTime), List userAssignments = default(List)) + public Group(string accountId = default(string), DateTime creationDate = default(DateTime), string description = default(string), string groupAlias = default(string), string groupId = default(string), string groupName = default(string), bool isSubclaimsWithOperator = default(bool), DateTime modificationDate = default(DateTime), List userAssignments = default(List)) { this.AccountId = accountId; this.CreationDate = creationDate; @@ -51,6 +52,7 @@ public partial class Group : IEquatable, IValidatableObject this.GroupAlias = groupAlias; this.GroupId = groupId; this.GroupName = groupName; + this.IsSubclaimsWithOperator = isSubclaimsWithOperator; this.ModificationDate = modificationDate; this.UserAssignments = userAssignments; } @@ -91,6 +93,12 @@ public partial class Group : IEquatable, IValidatableObject [DataMember(Name = "group_name", EmitDefaultValue = false)] public string GroupName { get; set; } + /// + /// Gets or Sets IsSubclaimsWithOperator + /// + [DataMember(Name = "is_subclaims_with_operator", EmitDefaultValue = true)] + public bool IsSubclaimsWithOperator { get; set; } + /// /// Gets or Sets ModificationDate /// @@ -117,6 +125,7 @@ public override string ToString() sb.Append(" GroupAlias: ").Append(GroupAlias).Append("\n"); sb.Append(" GroupId: ").Append(GroupId).Append("\n"); sb.Append(" GroupName: ").Append(GroupName).Append("\n"); + sb.Append(" IsSubclaimsWithOperator: ").Append(IsSubclaimsWithOperator).Append("\n"); sb.Append(" ModificationDate: ").Append(ModificationDate).Append("\n"); sb.Append(" UserAssignments: ").Append(UserAssignments).Append("\n"); sb.Append("}\n"); @@ -184,6 +193,10 @@ public bool Equals(Group input) (this.GroupName != null && this.GroupName.Equals(input.GroupName)) ) && + ( + this.IsSubclaimsWithOperator == input.IsSubclaimsWithOperator || + this.IsSubclaimsWithOperator.Equals(input.IsSubclaimsWithOperator) + ) && ( this.ModificationDate == input.ModificationDate || (this.ModificationDate != null && @@ -230,6 +243,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.GroupName.GetHashCode(); } + hashCode = (hashCode * 59) + this.IsSubclaimsWithOperator.GetHashCode(); if (this.ModificationDate != null) { hashCode = (hashCode * 59) + this.ModificationDate.GetHashCode(); diff --git a/src/akeyless/Model/ListAcmeAccounts.cs b/src/akeyless/Model/ListAcmeAccounts.cs new file mode 100644 index 0000000..5816d21 --- /dev/null +++ b/src/akeyless/Model/ListAcmeAccounts.cs @@ -0,0 +1,193 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// listAcmeAccounts is a command lists acme external accounts for a cert issuer + /// + [DataContract(Name = "listAcmeAccounts")] + public partial class ListAcmeAccounts : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + [JsonConstructorAttribute] + protected ListAcmeAccounts() { } + /// + /// Initializes a new instance of the class. + /// + /// The name of the PKI certificate issuer (required). + /// Set output format to JSON (default to false). + /// Authentication token (see `/auth` and `/configure`). + /// The universal identity token, Required only for universal_identity authentication. + public ListAcmeAccounts(string certIssuerName = default(string), bool json = false, string token = default(string), string uidToken = default(string)) + { + // to ensure "certIssuerName" is required (not null) + if (certIssuerName == null) + { + throw new ArgumentNullException("certIssuerName is a required property for ListAcmeAccounts and cannot be null"); + } + this.CertIssuerName = certIssuerName; + this.Json = json; + this.Token = token; + this.UidToken = uidToken; + } + + /// + /// The name of the PKI certificate issuer + /// + /// The name of the PKI certificate issuer + [DataMember(Name = "cert-issuer-name", IsRequired = true, EmitDefaultValue = true)] + public string CertIssuerName { get; set; } + + /// + /// Set output format to JSON + /// + /// Set output format to JSON + [DataMember(Name = "json", EmitDefaultValue = true)] + public bool Json { get; set; } + + /// + /// Authentication token (see `/auth` and `/configure`) + /// + /// Authentication token (see `/auth` and `/configure`) + [DataMember(Name = "token", EmitDefaultValue = false)] + public string Token { get; set; } + + /// + /// The universal identity token, Required only for universal_identity authentication + /// + /// The universal identity token, Required only for universal_identity authentication + [DataMember(Name = "uid-token", EmitDefaultValue = false)] + public string UidToken { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class ListAcmeAccounts {\n"); + sb.Append(" CertIssuerName: ").Append(CertIssuerName).Append("\n"); + sb.Append(" Json: ").Append(Json).Append("\n"); + sb.Append(" Token: ").Append(Token).Append("\n"); + sb.Append(" UidToken: ").Append(UidToken).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as ListAcmeAccounts); + } + + /// + /// Returns true if ListAcmeAccounts instances are equal + /// + /// Instance of ListAcmeAccounts to be compared + /// Boolean + public bool Equals(ListAcmeAccounts input) + { + if (input == null) + { + return false; + } + return + ( + this.CertIssuerName == input.CertIssuerName || + (this.CertIssuerName != null && + this.CertIssuerName.Equals(input.CertIssuerName)) + ) && + ( + this.Json == input.Json || + this.Json.Equals(input.Json) + ) && + ( + this.Token == input.Token || + (this.Token != null && + this.Token.Equals(input.Token)) + ) && + ( + this.UidToken == input.UidToken || + (this.UidToken != null && + this.UidToken.Equals(input.UidToken)) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.CertIssuerName != null) + { + hashCode = (hashCode * 59) + this.CertIssuerName.GetHashCode(); + } + hashCode = (hashCode * 59) + this.Json.GetHashCode(); + if (this.Token != null) + { + hashCode = (hashCode * 59) + this.Token.GetHashCode(); + } + if (this.UidToken != null) + { + hashCode = (hashCode * 59) + this.UidToken.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/ListAcmeAccountsOutput.cs b/src/akeyless/Model/ListAcmeAccountsOutput.cs new file mode 100644 index 0000000..3f3c50b --- /dev/null +++ b/src/akeyless/Model/ListAcmeAccountsOutput.cs @@ -0,0 +1,130 @@ +/* + * Akeyless API + * + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * Generated by: https://github.com/openapitools/openapi-generator.git + */ + + +using System; +using System.Collections; +using System.Collections.Generic; +using System.Collections.ObjectModel; +using System.Linq; +using System.IO; +using System.Runtime.Serialization; +using System.Text; +using System.Text.RegularExpressions; +using Newtonsoft.Json; +using Newtonsoft.Json.Converters; +using Newtonsoft.Json.Linq; +using System.ComponentModel.DataAnnotations; +using OpenAPIDateConverter = akeyless.Client.OpenAPIDateConverter; + +namespace akeyless.Model +{ + /// + /// ListAcmeAccountsOutput + /// + [DataContract(Name = "ListAcmeAccountsOutput")] + public partial class ListAcmeAccountsOutput : IEquatable, IValidatableObject + { + /// + /// Initializes a new instance of the class. + /// + /// accounts. + public ListAcmeAccountsOutput(List accounts = default(List)) + { + this.Accounts = accounts; + } + + /// + /// Gets or Sets Accounts + /// + [DataMember(Name = "accounts", EmitDefaultValue = false)] + public List Accounts { get; set; } + + /// + /// Returns the string presentation of the object + /// + /// String presentation of the object + public override string ToString() + { + StringBuilder sb = new StringBuilder(); + sb.Append("class ListAcmeAccountsOutput {\n"); + sb.Append(" Accounts: ").Append(Accounts).Append("\n"); + sb.Append("}\n"); + return sb.ToString(); + } + + /// + /// Returns the JSON string presentation of the object + /// + /// JSON string presentation of the object + public virtual string ToJson() + { + return Newtonsoft.Json.JsonConvert.SerializeObject(this, Newtonsoft.Json.Formatting.Indented); + } + + /// + /// Returns true if objects are equal + /// + /// Object to be compared + /// Boolean + public override bool Equals(object input) + { + return this.Equals(input as ListAcmeAccountsOutput); + } + + /// + /// Returns true if ListAcmeAccountsOutput instances are equal + /// + /// Instance of ListAcmeAccountsOutput to be compared + /// Boolean + public bool Equals(ListAcmeAccountsOutput input) + { + if (input == null) + { + return false; + } + return + ( + this.Accounts == input.Accounts || + this.Accounts != null && + input.Accounts != null && + this.Accounts.SequenceEqual(input.Accounts) + ); + } + + /// + /// Gets the hash code + /// + /// Hash code + public override int GetHashCode() + { + unchecked // Overflow is fine, just wrap + { + int hashCode = 41; + if (this.Accounts != null) + { + hashCode = (hashCode * 59) + this.Accounts.GetHashCode(); + } + return hashCode; + } + } + + /// + /// To validate all properties of the instance + /// + /// Validation context + /// Validation Result + public IEnumerable Validate(ValidationContext validationContext) + { + yield break; + } + } + +} diff --git a/src/akeyless/Model/PKICertificateIssueDetails.cs b/src/akeyless/Model/PKICertificateIssueDetails.cs index 1b365e6..0ff9029 100644 --- a/src/akeyless/Model/PKICertificateIssueDetails.cs +++ b/src/akeyless/Model/PKICertificateIssueDetails.cs @@ -35,6 +35,7 @@ public partial class PKICertificateIssueDetails : IEquatable /// Initializes a new instance of the class. /// + /// acmeEnabled. /// allowAnyName. /// allowCopyExtFromCsr. /// allowSubdomains. @@ -58,6 +59,7 @@ public partial class PKICertificateIssueDetails : IEquatablekeyType. /// keyUsageList. /// locality. + /// nonCriticalKeyUsage. /// A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years.. /// organizationList. /// organizationUnitList. @@ -67,8 +69,9 @@ public partial class PKICertificateIssueDetails : IEquatablerequireCn. /// serverFlag. /// streetAddress. - public PKICertificateIssueDetails(bool allowAnyName = default(bool), bool allowCopyExtFromCsr = default(bool), bool allowSubdomains = default(bool), List allowedDomainsList = default(List), Dictionary> allowedExtraExtensions = default(Dictionary>), List allowedUriSans = default(List), bool basicConstraintsValidForNonCa = default(bool), string certificateAuthorityMode = default(string), bool clientFlag = default(bool), bool codeSigningFlag = default(bool), List country = default(List), bool createPrivateCrl = default(bool), bool createPublicCrl = default(bool), string destinationPath = default(string), bool enforceHostnames = default(bool), List expirationEvents = default(List), long gwClusterId = default(long), string gwClusterUrl = default(string), bool isCa = default(bool), long keyBits = default(long), string keyType = default(string), List keyUsageList = default(List), List locality = default(List), long notBeforeDuration = default(long), List organizationList = default(List), List organizationUnitList = default(List), List postalCode = default(List), bool protectGeneratedCertificates = default(bool), List province = default(List), bool requireCn = default(bool), bool serverFlag = default(bool), List streetAddress = default(List)) + public PKICertificateIssueDetails(bool acmeEnabled = default(bool), bool allowAnyName = default(bool), bool allowCopyExtFromCsr = default(bool), bool allowSubdomains = default(bool), List allowedDomainsList = default(List), Dictionary> allowedExtraExtensions = default(Dictionary>), List allowedUriSans = default(List), bool basicConstraintsValidForNonCa = default(bool), string certificateAuthorityMode = default(string), bool clientFlag = default(bool), bool codeSigningFlag = default(bool), List country = default(List), bool createPrivateCrl = default(bool), bool createPublicCrl = default(bool), string destinationPath = default(string), bool enforceHostnames = default(bool), List expirationEvents = default(List), long gwClusterId = default(long), string gwClusterUrl = default(string), bool isCa = default(bool), long keyBits = default(long), string keyType = default(string), List keyUsageList = default(List), List locality = default(List), bool nonCriticalKeyUsage = default(bool), long notBeforeDuration = default(long), List organizationList = default(List), List organizationUnitList = default(List), List postalCode = default(List), bool protectGeneratedCertificates = default(bool), List province = default(List), bool requireCn = default(bool), bool serverFlag = default(bool), List streetAddress = default(List)) { + this.AcmeEnabled = acmeEnabled; this.AllowAnyName = allowAnyName; this.AllowCopyExtFromCsr = allowCopyExtFromCsr; this.AllowSubdomains = allowSubdomains; @@ -92,6 +95,7 @@ public partial class PKICertificateIssueDetails : IEquatable + /// Gets or Sets AcmeEnabled + /// + [DataMember(Name = "acme_enabled", EmitDefaultValue = true)] + public bool AcmeEnabled { get; set; } + /// /// Gets or Sets AllowAnyName /// @@ -244,6 +254,12 @@ public partial class PKICertificateIssueDetails : IEquatable Locality { get; set; } + /// + /// Gets or Sets NonCriticalKeyUsage + /// + [DataMember(Name = "non_critical_key_usage", EmitDefaultValue = true)] + public bool NonCriticalKeyUsage { get; set; } + /// /// A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. /// @@ -308,6 +324,7 @@ public override string ToString() { StringBuilder sb = new StringBuilder(); sb.Append("class PKICertificateIssueDetails {\n"); + sb.Append(" AcmeEnabled: ").Append(AcmeEnabled).Append("\n"); sb.Append(" AllowAnyName: ").Append(AllowAnyName).Append("\n"); sb.Append(" AllowCopyExtFromCsr: ").Append(AllowCopyExtFromCsr).Append("\n"); sb.Append(" AllowSubdomains: ").Append(AllowSubdomains).Append("\n"); @@ -331,6 +348,7 @@ public override string ToString() sb.Append(" KeyType: ").Append(KeyType).Append("\n"); sb.Append(" KeyUsageList: ").Append(KeyUsageList).Append("\n"); sb.Append(" Locality: ").Append(Locality).Append("\n"); + sb.Append(" NonCriticalKeyUsage: ").Append(NonCriticalKeyUsage).Append("\n"); sb.Append(" NotBeforeDuration: ").Append(NotBeforeDuration).Append("\n"); sb.Append(" OrganizationList: ").Append(OrganizationList).Append("\n"); sb.Append(" OrganizationUnitList: ").Append(OrganizationUnitList).Append("\n"); @@ -375,6 +393,10 @@ public bool Equals(PKICertificateIssueDetails input) return false; } return + ( + this.AcmeEnabled == input.AcmeEnabled || + this.AcmeEnabled.Equals(input.AcmeEnabled) + ) && ( this.AllowAnyName == input.AllowAnyName || this.AllowAnyName.Equals(input.AllowAnyName) @@ -485,6 +507,10 @@ public bool Equals(PKICertificateIssueDetails input) input.Locality != null && this.Locality.SequenceEqual(input.Locality) ) && + ( + this.NonCriticalKeyUsage == input.NonCriticalKeyUsage || + this.NonCriticalKeyUsage.Equals(input.NonCriticalKeyUsage) + ) && ( this.NotBeforeDuration == input.NotBeforeDuration || this.NotBeforeDuration.Equals(input.NotBeforeDuration) @@ -542,6 +568,7 @@ public override int GetHashCode() unchecked // Overflow is fine, just wrap { int hashCode = 41; + hashCode = (hashCode * 59) + this.AcmeEnabled.GetHashCode(); hashCode = (hashCode * 59) + this.AllowAnyName.GetHashCode(); hashCode = (hashCode * 59) + this.AllowCopyExtFromCsr.GetHashCode(); hashCode = (hashCode * 59) + this.AllowSubdomains.GetHashCode(); @@ -598,6 +625,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.Locality.GetHashCode(); } + hashCode = (hashCode * 59) + this.NonCriticalKeyUsage.GetHashCode(); hashCode = (hashCode * 59) + this.NotBeforeDuration.GetHashCode(); if (this.OrganizationList != null) { diff --git a/src/akeyless/Model/RoleAssociationDetails.cs b/src/akeyless/Model/RoleAssociationDetails.cs index 2418868..b0cac5c 100644 --- a/src/akeyless/Model/RoleAssociationDetails.cs +++ b/src/akeyless/Model/RoleAssociationDetails.cs @@ -38,13 +38,15 @@ public partial class RoleAssociationDetails : IEquatable /// assocId. /// authMethodName. /// authMethodSubClaims. + /// isSubclaimsWithOperator. /// roleName. /// subClaimsCaseSensitive. - public RoleAssociationDetails(string assocId = default(string), string authMethodName = default(string), Dictionary> authMethodSubClaims = default(Dictionary>), string roleName = default(string), bool subClaimsCaseSensitive = default(bool)) + public RoleAssociationDetails(string assocId = default(string), string authMethodName = default(string), Dictionary> authMethodSubClaims = default(Dictionary>), bool isSubclaimsWithOperator = default(bool), string roleName = default(string), bool subClaimsCaseSensitive = default(bool)) { this.AssocId = assocId; this.AuthMethodName = authMethodName; this.AuthMethodSubClaims = authMethodSubClaims; + this.IsSubclaimsWithOperator = isSubclaimsWithOperator; this.RoleName = roleName; this.SubClaimsCaseSensitive = subClaimsCaseSensitive; } @@ -67,6 +69,12 @@ public partial class RoleAssociationDetails : IEquatable [DataMember(Name = "auth_method_sub_claims", EmitDefaultValue = false)] public Dictionary> AuthMethodSubClaims { get; set; } + /// + /// Gets or Sets IsSubclaimsWithOperator + /// + [DataMember(Name = "is_subclaims_with_operator", EmitDefaultValue = true)] + public bool IsSubclaimsWithOperator { get; set; } + /// /// Gets or Sets RoleName /// @@ -90,6 +98,7 @@ public override string ToString() sb.Append(" AssocId: ").Append(AssocId).Append("\n"); sb.Append(" AuthMethodName: ").Append(AuthMethodName).Append("\n"); sb.Append(" AuthMethodSubClaims: ").Append(AuthMethodSubClaims).Append("\n"); + sb.Append(" IsSubclaimsWithOperator: ").Append(IsSubclaimsWithOperator).Append("\n"); sb.Append(" RoleName: ").Append(RoleName).Append("\n"); sb.Append(" SubClaimsCaseSensitive: ").Append(SubClaimsCaseSensitive).Append("\n"); sb.Append("}\n"); @@ -143,6 +152,10 @@ public bool Equals(RoleAssociationDetails input) input.AuthMethodSubClaims != null && this.AuthMethodSubClaims.SequenceEqual(input.AuthMethodSubClaims) ) && + ( + this.IsSubclaimsWithOperator == input.IsSubclaimsWithOperator || + this.IsSubclaimsWithOperator.Equals(input.IsSubclaimsWithOperator) + ) && ( this.RoleName == input.RoleName || (this.RoleName != null && @@ -175,6 +188,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.AuthMethodSubClaims.GetHashCode(); } + hashCode = (hashCode * 59) + this.IsSubclaimsWithOperator.GetHashCode(); if (this.RoleName != null) { hashCode = (hashCode * 59) + this.RoleName.GetHashCode(); diff --git a/src/akeyless/Model/RoleAuthMethodAssociation.cs b/src/akeyless/Model/RoleAuthMethodAssociation.cs index 48bb34b..d06e646 100644 --- a/src/akeyless/Model/RoleAuthMethodAssociation.cs +++ b/src/akeyless/Model/RoleAuthMethodAssociation.cs @@ -39,13 +39,15 @@ public partial class RoleAuthMethodAssociation : IEquatableauthMethodAccessId. /// authMethodName. /// authMethodSubClaims. + /// isSubclaimsWithOperator. /// subClaimsCaseSensitive. - public RoleAuthMethodAssociation(string assocId = default(string), string authMethodAccessId = default(string), string authMethodName = default(string), Dictionary> authMethodSubClaims = default(Dictionary>), bool subClaimsCaseSensitive = default(bool)) + public RoleAuthMethodAssociation(string assocId = default(string), string authMethodAccessId = default(string), string authMethodName = default(string), Dictionary> authMethodSubClaims = default(Dictionary>), bool isSubclaimsWithOperator = default(bool), bool subClaimsCaseSensitive = default(bool)) { this.AssocId = assocId; this.AuthMethodAccessId = authMethodAccessId; this.AuthMethodName = authMethodName; this.AuthMethodSubClaims = authMethodSubClaims; + this.IsSubclaimsWithOperator = isSubclaimsWithOperator; this.SubClaimsCaseSensitive = subClaimsCaseSensitive; } @@ -73,6 +75,12 @@ public partial class RoleAuthMethodAssociation : IEquatable> AuthMethodSubClaims { get; set; } + /// + /// Gets or Sets IsSubclaimsWithOperator + /// + [DataMember(Name = "is_subclaims_with_operator", EmitDefaultValue = true)] + public bool IsSubclaimsWithOperator { get; set; } + /// /// Gets or Sets SubClaimsCaseSensitive /// @@ -91,6 +99,7 @@ public override string ToString() sb.Append(" AuthMethodAccessId: ").Append(AuthMethodAccessId).Append("\n"); sb.Append(" AuthMethodName: ").Append(AuthMethodName).Append("\n"); sb.Append(" AuthMethodSubClaims: ").Append(AuthMethodSubClaims).Append("\n"); + sb.Append(" IsSubclaimsWithOperator: ").Append(IsSubclaimsWithOperator).Append("\n"); sb.Append(" SubClaimsCaseSensitive: ").Append(SubClaimsCaseSensitive).Append("\n"); sb.Append("}\n"); return sb.ToString(); @@ -148,6 +157,10 @@ public bool Equals(RoleAuthMethodAssociation input) input.AuthMethodSubClaims != null && this.AuthMethodSubClaims.SequenceEqual(input.AuthMethodSubClaims) ) && + ( + this.IsSubclaimsWithOperator == input.IsSubclaimsWithOperator || + this.IsSubclaimsWithOperator.Equals(input.IsSubclaimsWithOperator) + ) && ( this.SubClaimsCaseSensitive == input.SubClaimsCaseSensitive || this.SubClaimsCaseSensitive.Equals(input.SubClaimsCaseSensitive) @@ -179,6 +192,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.AuthMethodSubClaims.GetHashCode(); } + hashCode = (hashCode * 59) + this.IsSubclaimsWithOperator.GetHashCode(); hashCode = (hashCode * 59) + this.SubClaimsCaseSensitive.GetHashCode(); return hashCode; } diff --git a/src/akeyless/Model/UpdateClassicKeyCertificate.cs b/src/akeyless/Model/UpdateClassicKeyCertificate.cs index 4e586d8..9bbbee5 100644 --- a/src/akeyless/Model/UpdateClassicKeyCertificate.cs +++ b/src/akeyless/Model/UpdateClassicKeyCertificate.cs @@ -41,11 +41,12 @@ protected UpdateClassicKeyCertificate() { } /// Initializes a new instance of the class. /// /// PEM Certificate in a Base64 format. Used for updating RSA keys' certificates.. + /// certificateFormat. /// Set output format to JSON (default to false). /// ClassicKey name (required). /// Authentication token (see `/auth` and `/configure`). /// The universal identity token, Required only for universal_identity authentication. - public UpdateClassicKeyCertificate(string certFileData = default(string), bool json = false, string name = default(string), string token = default(string), string uidToken = default(string)) + public UpdateClassicKeyCertificate(string certFileData = default(string), string certificateFormat = default(string), bool json = false, string name = default(string), string token = default(string), string uidToken = default(string)) { // to ensure "name" is required (not null) if (name == null) @@ -54,6 +55,7 @@ protected UpdateClassicKeyCertificate() { } } this.Name = name; this.CertFileData = certFileData; + this.CertificateFormat = certificateFormat; this.Json = json; this.Token = token; this.UidToken = uidToken; @@ -66,6 +68,12 @@ protected UpdateClassicKeyCertificate() { } [DataMember(Name = "cert-file-data", EmitDefaultValue = false)] public string CertFileData { get; set; } + /// + /// Gets or Sets CertificateFormat + /// + [DataMember(Name = "certificate-format", EmitDefaultValue = false)] + public string CertificateFormat { get; set; } + /// /// Set output format to JSON /// @@ -103,6 +111,7 @@ public override string ToString() StringBuilder sb = new StringBuilder(); sb.Append("class UpdateClassicKeyCertificate {\n"); sb.Append(" CertFileData: ").Append(CertFileData).Append("\n"); + sb.Append(" CertificateFormat: ").Append(CertificateFormat).Append("\n"); sb.Append(" Json: ").Append(Json).Append("\n"); sb.Append(" Name: ").Append(Name).Append("\n"); sb.Append(" Token: ").Append(Token).Append("\n"); @@ -147,6 +156,11 @@ public bool Equals(UpdateClassicKeyCertificate input) (this.CertFileData != null && this.CertFileData.Equals(input.CertFileData)) ) && + ( + this.CertificateFormat == input.CertificateFormat || + (this.CertificateFormat != null && + this.CertificateFormat.Equals(input.CertificateFormat)) + ) && ( this.Json == input.Json || this.Json.Equals(input.Json) @@ -181,6 +195,10 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.CertFileData.GetHashCode(); } + if (this.CertificateFormat != null) + { + hashCode = (hashCode * 59) + this.CertificateFormat.GetHashCode(); + } hashCode = (hashCode * 59) + this.Json.GetHashCode(); if (this.Name != null) { diff --git a/src/akeyless/Model/UpdateItem.cs b/src/akeyless/Model/UpdateItem.cs index 176f644..4ada29d 100644 --- a/src/akeyless/Model/UpdateItem.cs +++ b/src/akeyless/Model/UpdateItem.cs @@ -44,6 +44,7 @@ protected UpdateItem() { } /// for personal password manager (default to "regular"). /// List of the new tags that will be attached to this item. /// PEM Certificate in a Base64 format. Used for updating RSA keys' certificates.. + /// certificateFormat. /// Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret). /// Protection from accidental deletion of this object [true/false]. /// Description of the object (default to "default_metadata"). @@ -83,7 +84,7 @@ protected UpdateItem() { } /// Web-Proxy via Akeyless Web Access Bastion (default to false). /// Authentication token (see `/auth` and `/configure`). /// The universal identity token, Required only for universal_identity authentication. - public UpdateItem(string providerType = default(string), string accessibility = "regular", List addTag = default(List), string certFileData = default(string), string changeEvent = default(string), string deleteProtection = default(string), string description = "default_metadata", List expirationEventIn = default(List), string hostProvider = default(string), bool json = false, string maxVersions = default(string), string name = default(string), string newMetadata = "default_metadata", string newName = default(string), List rmTag = default(List), string rotateAfterDisconnect = "false", List secureAccessAddHost = default(List), string secureAccessAllowExternalUser = default(string), bool secureAccessAllowPortForwading = default(bool), string secureAccessAwsAccountId = default(string), bool secureAccessAwsNativeCli = default(bool), string secureAccessAwsRegion = default(string), string secureAccessBastionApi = default(string), string secureAccessBastionIssuer = default(string), string secureAccessBastionSsh = default(string), string secureAccessClusterEndpoint = default(string), string secureAccessDashboardUrl = default(string), string secureAccessDbName = default(string), string secureAccessDbSchema = default(string), string secureAccessEnable = default(string), List secureAccessHost = default(List), string secureAccessRdGatewayServer = default(string), string secureAccessRdpDomain = default(string), string secureAccessRdpUser = default(string), List secureAccessRmHost = default(List), string secureAccessSshCreds = default(string), string secureAccessSshCredsUser = default(string), string secureAccessUrl = default(string), bool secureAccessUseInternalBastion = default(bool), bool secureAccessWebBrowsing = false, bool secureAccessWebProxy = false, string token = default(string), string uidToken = default(string)) + public UpdateItem(string providerType = default(string), string accessibility = "regular", List addTag = default(List), string certFileData = default(string), string certificateFormat = default(string), string changeEvent = default(string), string deleteProtection = default(string), string description = "default_metadata", List expirationEventIn = default(List), string hostProvider = default(string), bool json = false, string maxVersions = default(string), string name = default(string), string newMetadata = "default_metadata", string newName = default(string), List rmTag = default(List), string rotateAfterDisconnect = "false", List secureAccessAddHost = default(List), string secureAccessAllowExternalUser = default(string), bool secureAccessAllowPortForwading = default(bool), string secureAccessAwsAccountId = default(string), bool secureAccessAwsNativeCli = default(bool), string secureAccessAwsRegion = default(string), string secureAccessBastionApi = default(string), string secureAccessBastionIssuer = default(string), string secureAccessBastionSsh = default(string), string secureAccessClusterEndpoint = default(string), string secureAccessDashboardUrl = default(string), string secureAccessDbName = default(string), string secureAccessDbSchema = default(string), string secureAccessEnable = default(string), List secureAccessHost = default(List), string secureAccessRdGatewayServer = default(string), string secureAccessRdpDomain = default(string), string secureAccessRdpUser = default(string), List secureAccessRmHost = default(List), string secureAccessSshCreds = default(string), string secureAccessSshCredsUser = default(string), string secureAccessUrl = default(string), bool secureAccessUseInternalBastion = default(bool), bool secureAccessWebBrowsing = false, bool secureAccessWebProxy = false, string token = default(string), string uidToken = default(string)) { // to ensure "name" is required (not null) if (name == null) @@ -96,6 +97,7 @@ protected UpdateItem() { } this.Accessibility = accessibility ?? "regular"; this.AddTag = addTag; this.CertFileData = certFileData; + this.CertificateFormat = certificateFormat; this.ChangeEvent = changeEvent; this.DeleteProtection = deleteProtection; // use default value if no "description" provided @@ -166,6 +168,12 @@ protected UpdateItem() { } [DataMember(Name = "cert-file-data", EmitDefaultValue = false)] public string CertFileData { get; set; } + /// + /// Gets or Sets CertificateFormat + /// + [DataMember(Name = "certificate-format", EmitDefaultValue = false)] + public string CertificateFormat { get; set; } + /// /// Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) /// @@ -451,6 +459,7 @@ public override string ToString() sb.Append(" Accessibility: ").Append(Accessibility).Append("\n"); sb.Append(" AddTag: ").Append(AddTag).Append("\n"); sb.Append(" CertFileData: ").Append(CertFileData).Append("\n"); + sb.Append(" CertificateFormat: ").Append(CertificateFormat).Append("\n"); sb.Append(" ChangeEvent: ").Append(ChangeEvent).Append("\n"); sb.Append(" DeleteProtection: ").Append(DeleteProtection).Append("\n"); sb.Append(" Description: ").Append(Description).Append("\n"); @@ -546,6 +555,11 @@ public bool Equals(UpdateItem input) (this.CertFileData != null && this.CertFileData.Equals(input.CertFileData)) ) && + ( + this.CertificateFormat == input.CertificateFormat || + (this.CertificateFormat != null && + this.CertificateFormat.Equals(input.CertificateFormat)) + ) && ( this.ChangeEvent == input.ChangeEvent || (this.ChangeEvent != null && @@ -767,6 +781,10 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.CertFileData.GetHashCode(); } + if (this.CertificateFormat != null) + { + hashCode = (hashCode * 59) + this.CertificateFormat.GetHashCode(); + } if (this.ChangeEvent != null) { hashCode = (hashCode * 59) + this.ChangeEvent.GetHashCode(); diff --git a/src/akeyless/Model/UpdatePKICertIssuer.cs b/src/akeyless/Model/UpdatePKICertIssuer.cs index 56dd3e4..450bfcc 100644 --- a/src/akeyless/Model/UpdatePKICertIssuer.cs +++ b/src/akeyless/Model/UpdatePKICertIssuer.cs @@ -52,11 +52,13 @@ protected UpdatePKICertIssuer() { } /// A comma-separated list of countries that will be set in the issued certificate. /// Set this to allow the issuer will expose a CRL endpoint in the Gateway. /// Set this to allow the cert issuer will expose a public CRL endpoint. + /// Mark key usage as critical [true/false] (default to "true"). /// Protection from accidental deletion of this object [true/false]. /// Description of the object. /// A path in which to save generated certificates. + /// If set, the cert issuer will support the acme protocol. /// How many days before the expiration of the certificate would you like to be notified.. - /// The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA. + /// The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME. /// If set, the basic constraints extension will be added to certificate. /// Set output format to JSON (default to false). /// key-usage (default to "DigitalSignature,KeyAgreement,KeyEncipherment"). @@ -78,7 +80,7 @@ protected UpdatePKICertIssuer() { } /// Authentication token (see `/auth` and `/configure`). /// The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs (required). /// The universal identity token, Required only for universal_identity authentication. - public UpdatePKICertIssuer(List addTag = default(List), bool allowAnyName = default(bool), bool allowCopyExtFromCsr = default(bool), bool allowSubdomains = default(bool), string allowedDomains = default(string), string allowedExtraExtensions = default(string), string allowedUriSans = default(string), bool clientFlag = default(bool), bool codeSigningFlag = default(bool), string country = default(string), bool createPrivateCrl = default(bool), bool createPublicCrl = default(bool), string deleteProtection = default(string), string description = default(string), string destinationPath = default(string), List expirationEventIn = default(List), string gwClusterUrl = default(string), bool isCa = default(bool), bool json = false, string keyUsage = "DigitalSignature,KeyAgreement,KeyEncipherment", string locality = default(string), string metadata = default(string), string name = default(string), string newName = default(string), bool notEnforceHostnames = default(bool), bool notRequireCn = default(bool), string organizationalUnits = default(string), string organizations = default(string), string postalCode = default(string), bool protectCertificates = default(bool), string province = default(string), List rmTag = default(List), bool serverFlag = default(bool), string signerKeyName = "dummy_signer_key", string streetAddress = default(string), string token = default(string), string ttl = default(string), string uidToken = default(string)) + public UpdatePKICertIssuer(List addTag = default(List), bool allowAnyName = default(bool), bool allowCopyExtFromCsr = default(bool), bool allowSubdomains = default(bool), string allowedDomains = default(string), string allowedExtraExtensions = default(string), string allowedUriSans = default(string), bool clientFlag = default(bool), bool codeSigningFlag = default(bool), string country = default(string), bool createPrivateCrl = default(bool), bool createPublicCrl = default(bool), string criticalKeyUsage = "true", string deleteProtection = default(string), string description = default(string), string destinationPath = default(string), bool enableAcme = default(bool), List expirationEventIn = default(List), string gwClusterUrl = default(string), bool isCa = default(bool), bool json = false, string keyUsage = "DigitalSignature,KeyAgreement,KeyEncipherment", string locality = default(string), string metadata = default(string), string name = default(string), string newName = default(string), bool notEnforceHostnames = default(bool), bool notRequireCn = default(bool), string organizationalUnits = default(string), string organizations = default(string), string postalCode = default(string), bool protectCertificates = default(bool), string province = default(string), List rmTag = default(List), bool serverFlag = default(bool), string signerKeyName = "dummy_signer_key", string streetAddress = default(string), string token = default(string), string ttl = default(string), string uidToken = default(string)) { // to ensure "name" is required (not null) if (name == null) @@ -110,9 +112,12 @@ protected UpdatePKICertIssuer() { } this.Country = country; this.CreatePrivateCrl = createPrivateCrl; this.CreatePublicCrl = createPublicCrl; + // use default value if no "criticalKeyUsage" provided + this.CriticalKeyUsage = criticalKeyUsage ?? "true"; this.DeleteProtection = deleteProtection; this.Description = description; this.DestinationPath = destinationPath; + this.EnableAcme = enableAcme; this.ExpirationEventIn = expirationEventIn; this.GwClusterUrl = gwClusterUrl; this.IsCa = isCa; @@ -220,6 +225,13 @@ protected UpdatePKICertIssuer() { } [DataMember(Name = "create-public-crl", EmitDefaultValue = true)] public bool CreatePublicCrl { get; set; } + /// + /// Mark key usage as critical [true/false] + /// + /// Mark key usage as critical [true/false] + [DataMember(Name = "critical-key-usage", EmitDefaultValue = false)] + public string CriticalKeyUsage { get; set; } + /// /// Protection from accidental deletion of this object [true/false] /// @@ -241,6 +253,13 @@ protected UpdatePKICertIssuer() { } [DataMember(Name = "destination-path", EmitDefaultValue = false)] public string DestinationPath { get; set; } + /// + /// If set, the cert issuer will support the acme protocol + /// + /// If set, the cert issuer will support the acme protocol + [DataMember(Name = "enable-acme", EmitDefaultValue = true)] + public bool EnableAcme { get; set; } + /// /// How many days before the expiration of the certificate would you like to be notified. /// @@ -249,9 +268,9 @@ protected UpdatePKICertIssuer() { } public List ExpirationEventIn { get; set; } /// - /// The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA + /// The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME /// - /// The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA + /// The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME [DataMember(Name = "gw-cluster-url", EmitDefaultValue = false)] public string GwClusterUrl { get; set; } @@ -422,9 +441,11 @@ public override string ToString() sb.Append(" Country: ").Append(Country).Append("\n"); sb.Append(" CreatePrivateCrl: ").Append(CreatePrivateCrl).Append("\n"); sb.Append(" CreatePublicCrl: ").Append(CreatePublicCrl).Append("\n"); + sb.Append(" CriticalKeyUsage: ").Append(CriticalKeyUsage).Append("\n"); sb.Append(" DeleteProtection: ").Append(DeleteProtection).Append("\n"); sb.Append(" Description: ").Append(Description).Append("\n"); sb.Append(" DestinationPath: ").Append(DestinationPath).Append("\n"); + sb.Append(" EnableAcme: ").Append(EnableAcme).Append("\n"); sb.Append(" ExpirationEventIn: ").Append(ExpirationEventIn).Append("\n"); sb.Append(" GwClusterUrl: ").Append(GwClusterUrl).Append("\n"); sb.Append(" IsCa: ").Append(IsCa).Append("\n"); @@ -537,6 +558,11 @@ public bool Equals(UpdatePKICertIssuer input) this.CreatePublicCrl == input.CreatePublicCrl || this.CreatePublicCrl.Equals(input.CreatePublicCrl) ) && + ( + this.CriticalKeyUsage == input.CriticalKeyUsage || + (this.CriticalKeyUsage != null && + this.CriticalKeyUsage.Equals(input.CriticalKeyUsage)) + ) && ( this.DeleteProtection == input.DeleteProtection || (this.DeleteProtection != null && @@ -552,6 +578,10 @@ public bool Equals(UpdatePKICertIssuer input) (this.DestinationPath != null && this.DestinationPath.Equals(input.DestinationPath)) ) && + ( + this.EnableAcme == input.EnableAcme || + this.EnableAcme.Equals(input.EnableAcme) + ) && ( this.ExpirationEventIn == input.ExpirationEventIn || this.ExpirationEventIn != null && @@ -701,6 +731,10 @@ public override int GetHashCode() } hashCode = (hashCode * 59) + this.CreatePrivateCrl.GetHashCode(); hashCode = (hashCode * 59) + this.CreatePublicCrl.GetHashCode(); + if (this.CriticalKeyUsage != null) + { + hashCode = (hashCode * 59) + this.CriticalKeyUsage.GetHashCode(); + } if (this.DeleteProtection != null) { hashCode = (hashCode * 59) + this.DeleteProtection.GetHashCode(); @@ -713,6 +747,7 @@ public override int GetHashCode() { hashCode = (hashCode * 59) + this.DestinationPath.GetHashCode(); } + hashCode = (hashCode * 59) + this.EnableAcme.GetHashCode(); if (this.ExpirationEventIn != null) { hashCode = (hashCode * 59) + this.ExpirationEventIn.GetHashCode(); diff --git a/src/akeyless/akeyless.csproj b/src/akeyless/akeyless.csproj index 3078d3c..9118e75 100644 --- a/src/akeyless/akeyless.csproj +++ b/src/akeyless/akeyless.csproj @@ -12,7 +12,7 @@ A library generated from a OpenAPI doc No Copyright akeyless - 4.2.4 + 4.2.5 bin\$(Configuration)\$(TargetFramework)\akeyless.xml https://github.com/akeylesslabs/akeyless-csharp-netcore.git git