From db0f77f4205a580545d458dc2d4a2a283e8f3162 Mon Sep 17 00:00:00 2001 From: akeyless Date: Mon, 7 Oct 2024 07:19:49 +0000 Subject: [PATCH] "Release v4.2.5" --- .openapi-generator/FILES | 48 +- README.md | 11 + api/openapi.yaml | 430 +++++++++++++- build.gradle | 2 +- build.sbt | 2 +- docs/AcmeAccount.md | 16 + docs/AuthMethodRoleAssociation.md | 1 + docs/ChangeAdminAccountPassword.md | 17 + docs/CreatePKICertIssuer.md | 4 +- docs/DeactivateAcmeAccount.md | 19 + docs/GenerateAcmeEab.md | 16 + docs/GenerateAcmeEabOutput.md | 15 + docs/GetGroupOutput.md | 1 + docs/GetKubeExecCreds.md | 2 +- docs/GetPKICertificate.md | 2 +- docs/Group.md | 1 + docs/ListAcmeAccounts.md | 17 + docs/ListAcmeAccountsOutput.md | 13 + docs/PKICertificateIssueDetails.md | 2 + docs/RoleAssociationDetails.md | 1 + docs/RoleAuthMethodAssociation.md | 1 + docs/UpdateClassicKeyCertificate.md | 1 + docs/UpdateItem.md | 1 + docs/UpdatePKICertIssuer.md | 4 +- docs/V2Api.md | 248 ++++++++ pom.xml | 2 +- .../java/io/akeyless/client/ApiClient.java | 2 +- .../java/io/akeyless/client/api/V2Api.java | 530 ++++++++++++++++++ .../io/akeyless/client/model/AcmeAccount.java | 159 ++++++ .../model/AuthMethodRoleAssociation.java | 31 +- .../model/ChangeAdminAccountPassword.java | 216 +++++++ .../client/model/CreatePKICertIssuer.java | 64 ++- .../client/model/DeactivateAcmeAccount.java | 246 ++++++++ .../client/model/GenerateAcmeEab.java | 187 ++++++ .../client/model/GenerateAcmeEabOutput.java | 159 ++++++ .../akeyless/client/model/GetGroupOutput.java | 31 +- .../client/model/GetKubeExecCreds.java | 4 +- .../client/model/GetPKICertificate.java | 4 +- .../java/io/akeyless/client/model/Group.java | 31 +- .../client/model/ListAcmeAccounts.java | 188 +++++++ .../client/model/ListAcmeAccountsOutput.java | 111 ++++ .../model/PKICertificateIssueDetails.java | 62 +- .../client/model/RoleAssociationDetails.java | 31 +- .../model/RoleAuthMethodAssociation.java | 31 +- .../model/UpdateClassicKeyCertificate.java | 31 +- .../io/akeyless/client/model/UpdateItem.java | 31 +- .../client/model/UpdatePKICertIssuer.java | 64 ++- .../client/model/AcmeAccountTest.java | 67 +++ .../model/ChangeAdminAccountPasswordTest.java | 83 +++ .../model/DeactivateAcmeAccountTest.java | 91 +++ .../model/GenerateAcmeEabOutputTest.java | 68 +++ .../client/model/GenerateAcmeEabTest.java | 75 +++ .../model/ListAcmeAccountsOutputTest.java | 54 ++ .../client/model/ListAcmeAccountsTest.java | 75 +++ 54 files changed, 3543 insertions(+), 60 deletions(-) create mode 100644 docs/AcmeAccount.md create mode 100644 docs/ChangeAdminAccountPassword.md create mode 100644 docs/DeactivateAcmeAccount.md create mode 100644 docs/GenerateAcmeEab.md create mode 100644 docs/GenerateAcmeEabOutput.md create mode 100644 docs/ListAcmeAccounts.md create mode 100644 docs/ListAcmeAccountsOutput.md create mode 100644 src/main/java/io/akeyless/client/model/AcmeAccount.java create mode 100644 src/main/java/io/akeyless/client/model/ChangeAdminAccountPassword.java create mode 100644 src/main/java/io/akeyless/client/model/DeactivateAcmeAccount.java create mode 100644 src/main/java/io/akeyless/client/model/GenerateAcmeEab.java create mode 100644 src/main/java/io/akeyless/client/model/GenerateAcmeEabOutput.java create mode 100644 src/main/java/io/akeyless/client/model/ListAcmeAccounts.java create mode 100644 src/main/java/io/akeyless/client/model/ListAcmeAccountsOutput.java create mode 100644 src/test/java/io/akeyless/client/model/AcmeAccountTest.java create mode 100644 src/test/java/io/akeyless/client/model/ChangeAdminAccountPasswordTest.java create mode 100644 src/test/java/io/akeyless/client/model/DeactivateAcmeAccountTest.java create mode 100644 src/test/java/io/akeyless/client/model/GenerateAcmeEabOutputTest.java create mode 100644 src/test/java/io/akeyless/client/model/GenerateAcmeEabTest.java create mode 100644 src/test/java/io/akeyless/client/model/ListAcmeAccountsOutputTest.java create mode 100644 src/test/java/io/akeyless/client/model/ListAcmeAccountsTest.java diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index 27cb9c2c..49068883 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -13,6 +13,7 @@ docs/AccessOrGroupPermissionAssignment.md docs/AccessPermissionAssignment.md docs/AccountGeneralSettings.md docs/AccountObjectVersionSettingsOutput.md +docs/AcmeAccount.md docs/ActiveDirectoryMigration.md docs/ActiveDirectoryPayload.md docs/AddGatewayAllowedAccessId.md @@ -92,6 +93,7 @@ docs/CertificateIssueInfo.md docs/CertificateTemplateInfo.md docs/CertificateVersionInfo.md docs/CfInfo.md +docs/ChangeAdminAccountPassword.md docs/ChefTargetDetails.md docs/ClassicKeyDetailsInfo.md docs/ClassicKeyStatusInfo.md @@ -222,6 +224,7 @@ docs/DSProducerDetails.md docs/DataProtectionSection.md docs/DatadogForwardingConfig.md docs/DbTargetDetails.md +docs/DeactivateAcmeAccount.md docs/Decrypt.md docs/DecryptFile.md docs/DecryptFileOutput.md @@ -565,6 +568,8 @@ docs/GatewaysListResponse.md docs/GcpTargetDetails.md docs/GenCustomerFragment.md docs/GeneralConfigPart.md +docs/GenerateAcmeEab.md +docs/GenerateAcmeEabOutput.md docs/GenerateCsr.md docs/GenerateCsrOutput.md docs/GetAccountSettings.md @@ -670,6 +675,8 @@ docs/LdapTargetDetails.md docs/LeadershipConfigPart.md docs/LinkedDetails.md docs/LinkedTargetDetails.md +docs/ListAcmeAccounts.md +docs/ListAcmeAccountsOutput.md docs/ListAuthMethods.md docs/ListAuthMethodsOutput.md docs/ListGateways.md @@ -1080,6 +1087,7 @@ src/main/java/io/akeyless/client/model/AccessOrGroupPermissionAssignment.java src/main/java/io/akeyless/client/model/AccessPermissionAssignment.java src/main/java/io/akeyless/client/model/AccountGeneralSettings.java src/main/java/io/akeyless/client/model/AccountObjectVersionSettingsOutput.java +src/main/java/io/akeyless/client/model/AcmeAccount.java src/main/java/io/akeyless/client/model/ActiveDirectoryMigration.java src/main/java/io/akeyless/client/model/ActiveDirectoryPayload.java src/main/java/io/akeyless/client/model/AddGatewayAllowedAccessId.java @@ -1159,6 +1167,7 @@ src/main/java/io/akeyless/client/model/CertificateIssueInfo.java src/main/java/io/akeyless/client/model/CertificateTemplateInfo.java src/main/java/io/akeyless/client/model/CertificateVersionInfo.java src/main/java/io/akeyless/client/model/CfInfo.java +src/main/java/io/akeyless/client/model/ChangeAdminAccountPassword.java src/main/java/io/akeyless/client/model/ChefTargetDetails.java src/main/java/io/akeyless/client/model/ClassicKeyDetailsInfo.java src/main/java/io/akeyless/client/model/ClassicKeyStatusInfo.java @@ -1289,6 +1298,7 @@ src/main/java/io/akeyless/client/model/DSProducerDetails.java src/main/java/io/akeyless/client/model/DataProtectionSection.java src/main/java/io/akeyless/client/model/DatadogForwardingConfig.java src/main/java/io/akeyless/client/model/DbTargetDetails.java +src/main/java/io/akeyless/client/model/DeactivateAcmeAccount.java src/main/java/io/akeyless/client/model/Decrypt.java src/main/java/io/akeyless/client/model/DecryptFile.java src/main/java/io/akeyless/client/model/DecryptFileOutput.java @@ -1632,6 +1642,8 @@ src/main/java/io/akeyless/client/model/GatewaysListResponse.java src/main/java/io/akeyless/client/model/GcpTargetDetails.java src/main/java/io/akeyless/client/model/GenCustomerFragment.java src/main/java/io/akeyless/client/model/GeneralConfigPart.java +src/main/java/io/akeyless/client/model/GenerateAcmeEab.java +src/main/java/io/akeyless/client/model/GenerateAcmeEabOutput.java src/main/java/io/akeyless/client/model/GenerateCsr.java src/main/java/io/akeyless/client/model/GenerateCsrOutput.java src/main/java/io/akeyless/client/model/GetAccountSettings.java @@ -1737,6 +1749,8 @@ src/main/java/io/akeyless/client/model/LdapTargetDetails.java src/main/java/io/akeyless/client/model/LeadershipConfigPart.java src/main/java/io/akeyless/client/model/LinkedDetails.java src/main/java/io/akeyless/client/model/LinkedTargetDetails.java +src/main/java/io/akeyless/client/model/ListAcmeAccounts.java +src/main/java/io/akeyless/client/model/ListAcmeAccountsOutput.java src/main/java/io/akeyless/client/model/ListAuthMethods.java src/main/java/io/akeyless/client/model/ListAuthMethodsOutput.java src/main/java/io/akeyless/client/model/ListGateways.java @@ -2110,30 +2124,10 @@ src/main/java/io/akeyless/client/model/WindowsService.java src/main/java/io/akeyless/client/model/WindowsServiceAttributes.java src/main/java/io/akeyless/client/model/WindowsTargetDetails.java src/main/java/io/akeyless/client/model/ZeroSSLTargetDetails.java -src/test/java/io/akeyless/client/model/AwsStorageTest.java -src/test/java/io/akeyless/client/model/AzureStorageTest.java -src/test/java/io/akeyless/client/model/BastionConfigReplyObjTest.java -src/test/java/io/akeyless/client/model/BastionGlobalConfTest.java -src/test/java/io/akeyless/client/model/GatewayGetRemoteAccessTest.java -src/test/java/io/akeyless/client/model/GatewayUpdateRemoteAccessRdpRecordingsTest.java -src/test/java/io/akeyless/client/model/GatewayUpdateRemoteAccessTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsAwsS3Test.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsAzureAnalyticsTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsDatadogTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsElasticsearchTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsGoogleChronicleTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsLogstashTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsLogzIoTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsSplunkTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsStdoutTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsSumologicTest.java -src/test/java/io/akeyless/client/model/GwUpdateRemoteAccessSessionLogsSyslogTest.java -src/test/java/io/akeyless/client/model/NextAutoRotationEventTest.java -src/test/java/io/akeyless/client/model/PasswordExpirationInfoTest.java -src/test/java/io/akeyless/client/model/ResetAccessKeyTest.java -src/test/java/io/akeyless/client/model/ResetAuthMethodAccessKeyOutputTest.java -src/test/java/io/akeyless/client/model/SshBastionConfTest.java -src/test/java/io/akeyless/client/model/SshBastionSessionTerminationTest.java -src/test/java/io/akeyless/client/model/WebBastionConfTest.java -src/test/java/io/akeyless/client/model/WebBastionGuacamoleTest.java -src/test/java/io/akeyless/client/model/WebBastionRdpRecordTest.java +src/test/java/io/akeyless/client/model/AcmeAccountTest.java +src/test/java/io/akeyless/client/model/ChangeAdminAccountPasswordTest.java +src/test/java/io/akeyless/client/model/DeactivateAcmeAccountTest.java +src/test/java/io/akeyless/client/model/GenerateAcmeEabOutputTest.java +src/test/java/io/akeyless/client/model/GenerateAcmeEabTest.java +src/test/java/io/akeyless/client/model/ListAcmeAccountsOutputTest.java +src/test/java/io/akeyless/client/model/ListAcmeAccountsTest.java diff --git a/README.md b/README.md index c9ee0205..cf1ae09c 100644 --- a/README.md +++ b/README.md @@ -138,6 +138,7 @@ Class | Method | HTTP request | Description *V2Api* | [**authMethodUpdateOauth2**](docs/V2Api.md#authMethodUpdateOauth2) | **POST** /auth-method-update-oauth2 | *V2Api* | [**authMethodUpdateSAML**](docs/V2Api.md#authMethodUpdateSAML) | **POST** /auth-method-update-saml | *V2Api* | [**authMethodUpdateUniversalIdentity**](docs/V2Api.md#authMethodUpdateUniversalIdentity) | **POST** /auth-method-update-universal-identity | +*V2Api* | [**changeAdminAccountPassword**](docs/V2Api.md#changeAdminAccountPassword) | **POST** /change-admin-account-password | *V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure | *V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect | *V2Api* | [**createAWSTarget**](docs/V2Api.md#createAWSTarget) | **POST** /create-aws-target | @@ -195,6 +196,7 @@ Class | Method | HTTP request | Description *V2Api* | [**createWindowsTarget**](docs/V2Api.md#createWindowsTarget) | **POST** /create-windows-target | *V2Api* | [**createZeroSSLTarget**](docs/V2Api.md#createZeroSSLTarget) | **POST** /create-zerossl-target | *V2Api* | [**createldapTarget**](docs/V2Api.md#createldapTarget) | **POST** /create-ldap-target | +*V2Api* | [**deactivateAcmeAccount**](docs/V2Api.md#deactivateAcmeAccount) | **POST** /deactivate-acme-account | *V2Api* | [**decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt | *V2Api* | [**decryptBatch**](docs/V2Api.md#decryptBatch) | **POST** /decrypt-batch | *V2Api* | [**decryptGPG**](docs/V2Api.md#decryptGPG) | **POST** /decrypt-gpg | @@ -407,6 +409,7 @@ Class | Method | HTTP request | Description *V2Api* | [**gatewayUpdateRemoteAccessRdpRecordings**](docs/V2Api.md#gatewayUpdateRemoteAccessRdpRecordings) | **POST** /gateway-update-remote-access-rdp-recording | *V2Api* | [**gatewayUpdateTlsCert**](docs/V2Api.md#gatewayUpdateTlsCert) | **POST** /gateway-update-tls-cert | *V2Api* | [**gatewayUpdateTmpUsers**](docs/V2Api.md#gatewayUpdateTmpUsers) | **POST** /gateway-update-producer-tmp-creds | +*V2Api* | [**generateAcmeEab**](docs/V2Api.md#generateAcmeEab) | **POST** /generate-acme-eab | *V2Api* | [**generateCsr**](docs/V2Api.md#generateCsr) | **POST** /generate-csr | *V2Api* | [**getAccountLogo**](docs/V2Api.md#getAccountLogo) | **POST** /get-account-logo | *V2Api* | [**getAccountSettings**](docs/V2Api.md#getAccountSettings) | **POST** /get-account-settings | @@ -453,6 +456,7 @@ Class | Method | HTTP request | Description *V2Api* | [**kmipRenewServerCertificate**](docs/V2Api.md#kmipRenewServerCertificate) | **POST** /kmip-renew-environment | *V2Api* | [**kmipServerSetup**](docs/V2Api.md#kmipServerSetup) | **POST** /kmip-create-environment | *V2Api* | [**kmipSetServerState**](docs/V2Api.md#kmipSetServerState) | **POST** /kmip-set-environment-state | +*V2Api* | [**listAcmeAccounts**](docs/V2Api.md#listAcmeAccounts) | **POST** /list-acme-accounts | *V2Api* | [**listAuthMethods**](docs/V2Api.md#listAuthMethods) | **POST** /list-auth-methods | *V2Api* | [**listGateways**](docs/V2Api.md#listGateways) | **POST** /list-gateways | *V2Api* | [**listGroups**](docs/V2Api.md#listGroups) | **POST** /list-group | @@ -670,6 +674,7 @@ Class | Method | HTTP request | Description - [AccessPermissionAssignment](docs/AccessPermissionAssignment.md) - [AccountGeneralSettings](docs/AccountGeneralSettings.md) - [AccountObjectVersionSettingsOutput](docs/AccountObjectVersionSettingsOutput.md) + - [AcmeAccount](docs/AcmeAccount.md) - [ActiveDirectoryMigration](docs/ActiveDirectoryMigration.md) - [ActiveDirectoryPayload](docs/ActiveDirectoryPayload.md) - [AddGatewayAllowedAccessId](docs/AddGatewayAllowedAccessId.md) @@ -749,6 +754,7 @@ Class | Method | HTTP request | Description - [CertificateTemplateInfo](docs/CertificateTemplateInfo.md) - [CertificateVersionInfo](docs/CertificateVersionInfo.md) - [CfInfo](docs/CfInfo.md) + - [ChangeAdminAccountPassword](docs/ChangeAdminAccountPassword.md) - [ChefTargetDetails](docs/ChefTargetDetails.md) - [ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md) - [ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md) @@ -879,6 +885,7 @@ Class | Method | HTTP request | Description - [DataProtectionSection](docs/DataProtectionSection.md) - [DatadogForwardingConfig](docs/DatadogForwardingConfig.md) - [DbTargetDetails](docs/DbTargetDetails.md) + - [DeactivateAcmeAccount](docs/DeactivateAcmeAccount.md) - [Decrypt](docs/Decrypt.md) - [DecryptFile](docs/DecryptFile.md) - [DecryptFileOutput](docs/DecryptFileOutput.md) @@ -1222,6 +1229,8 @@ Class | Method | HTTP request | Description - [GcpTargetDetails](docs/GcpTargetDetails.md) - [GenCustomerFragment](docs/GenCustomerFragment.md) - [GeneralConfigPart](docs/GeneralConfigPart.md) + - [GenerateAcmeEab](docs/GenerateAcmeEab.md) + - [GenerateAcmeEabOutput](docs/GenerateAcmeEabOutput.md) - [GenerateCsr](docs/GenerateCsr.md) - [GenerateCsrOutput](docs/GenerateCsrOutput.md) - [GetAccountSettings](docs/GetAccountSettings.md) @@ -1327,6 +1336,8 @@ Class | Method | HTTP request | Description - [LeadershipConfigPart](docs/LeadershipConfigPart.md) - [LinkedDetails](docs/LinkedDetails.md) - [LinkedTargetDetails](docs/LinkedTargetDetails.md) + - [ListAcmeAccounts](docs/ListAcmeAccounts.md) + - [ListAcmeAccountsOutput](docs/ListAcmeAccountsOutput.md) - [ListAuthMethods](docs/ListAuthMethods.md) - [ListAuthMethodsOutput](docs/ListAuthMethodsOutput.md) - [ListGateways](docs/ListGateways.md) diff --git a/api/openapi.yaml b/api/openapi.yaml index be845ecd..e961c0be 100644 --- a/api/openapi.yaml +++ b/api/openapi.yaml @@ -976,6 +976,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /change-admin-account-password: + post: + operationId: changeAdminAccountPassword + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/changeAdminAccountPassword' + required: true + responses: + "200": + content: + application/json: + schema: + type: object + description: changeAdminAccountPasswordResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /configure: post: operationId: configure @@ -2630,6 +2659,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /deactivate-acme-account: + post: + operationId: deactivateAcmeAccount + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/deactivateAcmeAccount' + required: true + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/DeactivateAcmeAccountOutput' + description: deactivateAcmeAccountResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /decrypt: post: operationId: decrypt @@ -9125,6 +9183,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /generate-acme-eab: + post: + operationId: generateAcmeEab + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/generateAcmeEab' + required: true + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/GenerateAcmeEabOutput' + description: generateAcmeEabResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /generate-csr: post: operationId: generateCsr @@ -10115,6 +10202,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /list-acme-accounts: + post: + operationId: listAcmeAccounts + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/listAcmeAccounts' + required: true + responses: + "200": + content: + application/json: + schema: + $ref: '#/components/schemas/ListAcmeAccountsOutput' + description: listAcmeAccountsResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /list-auth-methods: post: operationId: listAuthMethods @@ -16611,6 +16727,12 @@ components: schema: $ref: '#/components/schemas/createLdapTargetOutput' description: createldapTargetResponse wraps response body. + deactivateAcmeAccountResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/DeactivateAcmeAccountOutput' + description: deactivateAcmeAccountResponse wraps response body. decryptBatchResponse: content: application/json: @@ -17839,6 +17961,12 @@ components: schema: $ref: '#/components/schemas/CustomerFragmentsConfigJson' description: genCustomerFragmentResponse wraps response body. + generateAcmeEabResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/GenerateAcmeEabOutput' + description: generateAcmeEabResponse wraps response body. generateCsrResponse: content: application/json: @@ -18065,6 +18193,12 @@ components: schema: $ref: '#/components/schemas/kmipSetServerStateOutput' description: kmipSetServerStateResponse wraps response body. + listAcmeAccountsResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/ListAcmeAccountsOutput' + description: listAcmeAccountsResponse wraps response body. listAuthMethodsResponse: content: application/json: @@ -18155,6 +18289,12 @@ components: schema: $ref: '#/components/schemas/ResetAuthMethodAccessKeyOutput' description: resetAccessKeyResponse wraps response body. + resetAccountAccessKeyResponse: + content: + application/json: + schema: + type: object + description: changeAdminAccountPasswordResponse wraps response body. reverseRBACResponse: content: application/json: @@ -19624,6 +19764,27 @@ components: x-go-name: ObjectSettings type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + AcmeAccount: + description: |- + AcmeAccount is copied without the jwk as it seems + like it has issues with sdk + example: + account_id: account_id + key_digest: key_digest + status: status + properties: + account_id: + description: AccountId is the ACME account id, not Akeyless account id + type: string + x-go-name: AccountId + key_digest: + type: string + x-go-name: KeyDigest + status: + type: string + x-go-name: Status + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands ActiveDirectoryMigration: example: general: @@ -20923,6 +21084,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -20968,6 +21130,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -21634,6 +21797,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -21657,6 +21821,9 @@ components: is_sub_claims_case_sensitive: type: boolean x-go-name: IsSubClaimsCaseSensitive + is_subclaims_with_operator: + type: boolean + x-go-name: IsSubclaimsWithOperator role_name: type: string x-go-name: RoleName @@ -22980,6 +23147,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -22996,6 +23164,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -23999,6 +24168,7 @@ components: country: country allowed-extra-extensions: allowed-extra-extensions metadata: metadata + enable-acme: true description: description organizational-units: organizational-units uid-token: uid-token @@ -24019,6 +24189,7 @@ components: is-ca: true create-private-crl: true ca-target: ca-target + critical-key-usage: "true" protect-certificates: true code-signing-flag: true locality: locality @@ -24098,6 +24269,11 @@ components: endpoint type: boolean x-go-name: CreatePublicCrl + critical-key-usage: + default: "true" + description: Mark key usage as critical [true/false] + type: string + x-go-name: CriticalKeyUsage delete_protection: description: Protection from accidental deletion of this object [true/false] type: string @@ -24110,6 +24286,10 @@ components: description: A path in which to save generated certificates type: string x-go-name: DestinationPath + enable-acme: + description: If set, the cert issuer will support the acme protocol + type: boolean + x-go-name: EnableAcme expiration-event-in: description: How many days before the expiration of the certificate would you like to be notified. @@ -24118,8 +24298,8 @@ components: type: array x-go-name: ExpirationEventsInDays gw-cluster-url: - description: The GW cluster URL to issue the certificate from, required - in Public CA mode or to allow CRLs on private CA + description: The GW cluster URL to issue the certificate from. Required + in Public CA mode, to allow CRLs on private CA, or to enable ACME type: string x-go-name: GWClusterURL is-ca: @@ -25682,6 +25862,9 @@ components: x-go-name: SSLConnectionMode type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + DeactivateAcmeAccountOutput: + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands DefaultConfigPart: example: saml_access_id: saml_access_id @@ -26981,6 +27164,24 @@ components: x-go-name: TLSKey type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/akeyless-api/gator + GenerateAcmeEabOutput: + example: + mac_key: mac_key + expires_at: 2000-01-23T04:56:07.000+00:00 + kid: kid + properties: + expires_at: + format: date-time + type: string + x-go-name: ExpiresAt + kid: + type: string + x-go-name: Kid + mac_key: + type: string + x-go-name: MacKey + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands GetAccountSettingsCommandOutput: example: secure_remote_access: @@ -27117,6 +27318,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 description: description creation_date: 2000-01-23T04:56:07.000+00:00 + is_subclaims_with_operator: true group_alias: group_alias properties: account_id: @@ -27138,6 +27340,9 @@ components: group_name: type: string x-go-name: GroupName + is_subclaims_with_operator: + type: boolean + x-go-name: IsSubclaimsWithOperator modification_date: format: date-time type: string @@ -27187,7 +27392,8 @@ components: extended-key-usage: description: 'A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: ''clientauth'', - ''serverauth''.' + ''serverauth''. If critical is present the extension will be marked as + critical' type: string x-go-name: ExtKeyUsage extra-extensions: @@ -27820,6 +28026,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 description: description creation_date: 2000-01-23T04:56:07.000+00:00 + is_subclaims_with_operator: true group_alias: group_alias properties: account_id: @@ -27841,6 +28048,9 @@ components: group_name: type: string x-go-name: GroupName + is_subclaims_with_operator: + type: boolean + x-go-name: IsSubclaimsWithOperator modification_date: format: date-time type: string @@ -28228,6 +28438,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -28244,6 +28455,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -28787,6 +28999,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -28803,6 +29016,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -29518,6 +29732,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -29534,6 +29749,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -30734,6 +30950,23 @@ components: x-go-name: Hosts type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + ListAcmeAccountsOutput: + example: + accounts: + - account_id: account_id + key_digest: key_digest + status: status + - account_id: account_id + key_digest: key_digest + status: status + properties: + accounts: + items: + $ref: '#/components/schemas/AcmeAccount' + type: array + x-go-name: Accounts + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands ListAuthMethodsOutput: example: next_page: next_page @@ -30780,6 +31013,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -30825,6 +31059,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -31121,6 +31356,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -31166,6 +31402,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -31455,6 +31692,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 description: description creation_date: 2000-01-23T04:56:07.000+00:00 + is_subclaims_with_operator: true group_alias: group_alias - account_id: account_id user_assignments: @@ -31475,6 +31713,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 description: description creation_date: 2000-01-23T04:56:07.000+00:00 + is_subclaims_with_operator: true group_alias: group_alias properties: groups: @@ -31594,6 +31833,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -31610,6 +31850,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -32153,6 +32394,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -32169,6 +32411,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -32362,6 +32605,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -32378,6 +32622,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -32921,6 +33166,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -32937,6 +33183,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -33152,6 +33399,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -33168,6 +33416,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -33711,6 +33960,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -33727,6 +33977,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -33920,6 +34171,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -33936,6 +34188,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -34479,6 +34732,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -34495,6 +34749,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -34611,6 +34866,7 @@ components: - client_permissions role_auth_methods_assoc: - assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -34619,6 +34875,7 @@ components: auth_method_access_id: auth_method_access_id sub_claims_case_sensitive: true - assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -34673,6 +34930,7 @@ components: - client_permissions role_auth_methods_assoc: - assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -34681,6 +34939,7 @@ components: auth_method_access_id: auth_method_access_id sub_claims_case_sensitive: true - assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -36412,6 +36671,7 @@ components: - street_address - street_address allow_subdomains: true + non_critical_key_usage: true key_type: key_type organization_unit_list: - organization_unit_list @@ -36428,6 +36688,7 @@ components: key: - allowed_extra_extensions - allowed_extra_extensions + acme_enabled: true allowed_domains_list: - allowed_domains_list - allowed_domains_list @@ -36459,6 +36720,9 @@ components: - postal_code client_flag: true properties: + acme_enabled: + type: boolean + x-go-name: AcmeEnabled allow_any_name: type: boolean x-go-name: AllowAnyName @@ -36553,6 +36817,9 @@ components: type: string type: array x-go-name: Locality + non_critical_key_usage: + type: boolean + x-go-name: NonCriticalKeyUsage not_before_duration: description: |- A Duration represents the elapsed time between two instants @@ -37022,6 +37289,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -37067,6 +37335,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -37130,6 +37399,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -37175,6 +37445,7 @@ components: ttl: 3 cb: 5 admin: true + is_subclaims_with_operator: true auth_method_sub_claims: key: - auth_method_sub_claims @@ -37247,6 +37518,7 @@ components: - client_permissions role_auth_methods_assoc: - assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -37255,6 +37527,7 @@ components: auth_method_access_id: auth_method_access_id sub_claims_case_sensitive: true - assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -37349,6 +37622,7 @@ components: example: role_name: role_name assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -37369,6 +37643,9 @@ components: type: array type: object x-go-name: AuthMethodSubClaims + is_subclaims_with_operator: + type: boolean + x-go-name: IsSubclaimsWithOperator role_name: type: string x-go-name: RoleName @@ -37383,6 +37660,7 @@ components: and an auth method. example: assoc_id: assoc_id + is_subclaims_with_operator: true auth_method_name: auth_method_name auth_method_sub_claims: key: @@ -37407,6 +37685,9 @@ components: type: array type: object x-go-name: AuthMethodSubClaims + is_subclaims_with_operator: + type: boolean + x-go-name: IsSubclaimsWithOperator sub_claims_case_sensitive: type: boolean x-go-name: IsSubClaimsCaseSensitive @@ -39391,6 +39672,7 @@ components: description: UpdateClassicKeyCertificate is a command that updates the certificate for a classic key example: + certificate-format: certificate-format name: name json: false cert-file-data: cert-file-data @@ -39402,6 +39684,9 @@ components: certificates. type: string x-go-name: CertFileData + certificate-format: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types json: default: false description: Set output format to JSON @@ -39456,6 +39741,7 @@ components: country: country allowed-extra-extensions: allowed-extra-extensions metadata: metadata + enable-acme: true description: description organizational-units: organizational-units new-name: new-name @@ -39479,6 +39765,7 @@ components: signer-key-name: dummy_signer_key is-ca: true create-private-crl: true + critical-key-usage: "true" protect-certificates: true code-signing-flag: true locality: locality @@ -39559,6 +39846,11 @@ components: endpoint type: boolean x-go-name: CreatePublicCrl + critical-key-usage: + default: "true" + description: Mark key usage as critical [true/false] + type: string + x-go-name: CriticalKeyUsage delete_protection: description: Protection from accidental deletion of this object [true/false] type: string @@ -39571,6 +39863,10 @@ components: description: A path in which to save generated certificates type: string x-go-name: DestinationPath + enable-acme: + description: If set, the cert issuer will support the acme protocol + type: boolean + x-go-name: EnableAcme expiration-event-in: description: How many days before the expiration of the certificate would you like to be notified. @@ -39579,8 +39875,8 @@ components: type: array x-go-name: ExpirationEventsInDays gw-cluster-url: - description: The GW cluster URL to issue the certificate from, required - in Public CA mode or to allow CRLs on private CA + description: The GW cluster URL to issue the certificate from. Required + in Public CA mode, to allow CRLs on private CA, or to enable ACME type: string x-go-name: GWClusterURL is-ca: @@ -43722,6 +44018,37 @@ components: - name type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + changeAdminAccountPassword: + properties: + current-password: + description: Current password + type: string + x-go-name: CurrentPassword + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + new-password: + description: New password + type: string + x-go-name: NewPassword + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + required: + - current-password + - new-password + title: changeAdminAccountPassword is a command that changes an admin account's + password key. + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands clientData: example: clientKeyData: clientKeyData @@ -49042,6 +49369,41 @@ components: x-go-name: TargetID type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + deactivateAcmeAccount: + description: deactivateAcmeAccount is a command that Deactivates \ Deletes an + acme external account + properties: + acme-account-id: + description: The acme account id to deactivate + type: string + x-go-name: AcmeAccountId + cert-issuer-name: + description: The name of the PKI certificate issuer + type: string + x-go-name: CertIssuerName + delete-account: + description: Delete the account + type: boolean + x-go-name: DeleteAccount + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + required: + - acme-account-id + - cert-issuer-name + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands decrypt: description: |- decrypt is a command that decrypts ciphertext into plaintext by using an AES @@ -85832,6 +86194,32 @@ components: title: genCustomerFragment is a command that generates customer fragment. type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + generateAcmeEab: + properties: + cert-issuer-name: + description: The name of the PKI certificate issuer + type: string + x-go-name: CertIssuerName + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + required: + - cert-issuer-name + title: generateAcmeEab is a command that generates a an external account binding + for a cert issuer. + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands generateCsr: properties: alg: @@ -86268,7 +86656,8 @@ components: extended-key-usage: description: 'A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: ''clientauth'', - ''serverauth''.' + ''serverauth''. If critical is present the extension will be marked as + critical' type: string x-go-name: ExtKeyUsage extra-extensions: @@ -87828,6 +88217,32 @@ components: x-go-name: IsActive type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + listAcmeAccounts: + description: listAcmeAccounts is a command lists acme external accounts for + a cert issuer + properties: + cert-issuer-name: + description: The name of the PKI certificate issuer + type: string + x-go-name: CertIssuerName + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + required: + - cert-issuer-name + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands listAuthMethods: description: |- listAuthMethods is a command that returns a list of all auth methods in the @@ -101377,6 +101792,9 @@ components: certificates. type: string x-go-name: CertFileData + certificate-format: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types change-event: description: Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) diff --git a/build.gradle b/build.gradle index 7b5f1c97..90ba5ca4 100644 --- a/build.gradle +++ b/build.gradle @@ -4,7 +4,7 @@ apply plugin: 'java' apply plugin: 'com.diffplug.spotless' group = 'io.akeyless' -version = '4.2.4' +version = '4.2.5' buildscript { repositories { diff --git a/build.sbt b/build.sbt index 21955d78..3ebe475d 100644 --- a/build.sbt +++ b/build.sbt @@ -2,7 +2,7 @@ lazy val root = (project in file(".")). settings( organization := "io.akeyless", name := "akeyless-java", - version := "4.2.4", + version := "4.2.5", scalaVersion := "2.11.4", scalacOptions ++= Seq("-feature"), javacOptions in compile ++= Seq("-Xlint:deprecation"), diff --git a/docs/AcmeAccount.md b/docs/AcmeAccount.md new file mode 100644 index 00000000..3b3da81b --- /dev/null +++ b/docs/AcmeAccount.md @@ -0,0 +1,16 @@ + + +# AcmeAccount + +AcmeAccount is copied without the jwk as it seems like it has issues with sdk + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**accountId** | **String** | AccountId is the ACME account id, not Akeyless account id | [optional] +**keyDigest** | **String** | | [optional] +**status** | **String** | | [optional] + + + diff --git a/docs/AuthMethodRoleAssociation.md b/docs/AuthMethodRoleAssociation.md index 2bf2296a..e79bb17d 100644 --- a/docs/AuthMethodRoleAssociation.md +++ b/docs/AuthMethodRoleAssociation.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **assocId** | **String** | | [optional] **authMethodSubClaims** | **Map<String, List<String>>** | | [optional] **isSubClaimsCaseSensitive** | **Boolean** | | [optional] +**isSubclaimsWithOperator** | **Boolean** | | [optional] **roleName** | **String** | | [optional] **rules** | [**Rules**](Rules.md) | | [optional] diff --git a/docs/ChangeAdminAccountPassword.md b/docs/ChangeAdminAccountPassword.md new file mode 100644 index 00000000..1d7526ca --- /dev/null +++ b/docs/ChangeAdminAccountPassword.md @@ -0,0 +1,17 @@ + + +# ChangeAdminAccountPassword + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**currentPassword** | **String** | Current password | +**json** | **Boolean** | Set output format to JSON | [optional] +**newPassword** | **String** | New password | +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] + + + diff --git a/docs/CreatePKICertIssuer.md b/docs/CreatePKICertIssuer.md index 597cc95c..5df8fe08 100644 --- a/docs/CreatePKICertIssuer.md +++ b/docs/CreatePKICertIssuer.md @@ -19,11 +19,13 @@ Name | Type | Description | Notes **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] **createPrivateCrl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] **createPublicCrl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] +**criticalKeyUsage** | **String** | Mark key usage as critical [true/false] | [optional] **deleteProtection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] **description** | **String** | Description of the object | [optional] **destinationPath** | **String** | A path in which to save generated certificates | [optional] +**enableAcme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] **expirationEventIn** | **List<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] -**gwClusterUrl** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] +**gwClusterUrl** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] **isCa** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyUsage** | **String** | key-usage | [optional] diff --git a/docs/DeactivateAcmeAccount.md b/docs/DeactivateAcmeAccount.md new file mode 100644 index 00000000..eabfea09 --- /dev/null +++ b/docs/DeactivateAcmeAccount.md @@ -0,0 +1,19 @@ + + +# DeactivateAcmeAccount + +deactivateAcmeAccount is a command that Deactivates \\ Deletes an acme external account + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**acmeAccountId** | **String** | The acme account id to deactivate | +**certIssuerName** | **String** | The name of the PKI certificate issuer | +**deleteAccount** | **Boolean** | Delete the account | [optional] +**json** | **Boolean** | Set output format to JSON | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] + + + diff --git a/docs/GenerateAcmeEab.md b/docs/GenerateAcmeEab.md new file mode 100644 index 00000000..0e93c724 --- /dev/null +++ b/docs/GenerateAcmeEab.md @@ -0,0 +1,16 @@ + + +# GenerateAcmeEab + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**certIssuerName** | **String** | The name of the PKI certificate issuer | +**json** | **Boolean** | Set output format to JSON | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] + + + diff --git a/docs/GenerateAcmeEabOutput.md b/docs/GenerateAcmeEabOutput.md new file mode 100644 index 00000000..66a59bad --- /dev/null +++ b/docs/GenerateAcmeEabOutput.md @@ -0,0 +1,15 @@ + + +# GenerateAcmeEabOutput + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**expiresAt** | **OffsetDateTime** | | [optional] +**kid** | **String** | | [optional] +**macKey** | **String** | | [optional] + + + diff --git a/docs/GetGroupOutput.md b/docs/GetGroupOutput.md index a9bb4b9a..4679bae4 100644 --- a/docs/GetGroupOutput.md +++ b/docs/GetGroupOutput.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **groupAlias** | **String** | | [optional] **groupId** | **String** | | [optional] **groupName** | **String** | | [optional] +**isSubclaimsWithOperator** | **Boolean** | | [optional] **modificationDate** | **OffsetDateTime** | | [optional] **userAssignments** | [**List<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] diff --git a/docs/GetKubeExecCreds.md b/docs/GetKubeExecCreds.md index bc7ace7b..198e73d8 100644 --- a/docs/GetKubeExecCreds.md +++ b/docs/GetKubeExecCreds.md @@ -13,7 +13,7 @@ Name | Type | Description | Notes **certIssuerName** | **String** | The name of the PKI certificate issuer | **commonName** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] **csrDataBase64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] -**extendedKeyUsage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] +**extendedKeyUsage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] **extraExtensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyDataBase64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] diff --git a/docs/GetPKICertificate.md b/docs/GetPKICertificate.md index 53980e58..24f9a262 100644 --- a/docs/GetPKICertificate.md +++ b/docs/GetPKICertificate.md @@ -11,7 +11,7 @@ Name | Type | Description | Notes **certIssuerName** | **String** | The name of the PKI certificate issuer | **commonName** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] **csrDataBase64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] -**extendedKeyUsage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] +**extendedKeyUsage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] **extraExtensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyDataBase64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] diff --git a/docs/Group.md b/docs/Group.md index 0aed75c6..29411570 100644 --- a/docs/Group.md +++ b/docs/Group.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **groupAlias** | **String** | | [optional] **groupId** | **String** | | [optional] **groupName** | **String** | | [optional] +**isSubclaimsWithOperator** | **Boolean** | | [optional] **modificationDate** | **OffsetDateTime** | | [optional] **userAssignments** | [**List<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] diff --git a/docs/ListAcmeAccounts.md b/docs/ListAcmeAccounts.md new file mode 100644 index 00000000..8f5e5519 --- /dev/null +++ b/docs/ListAcmeAccounts.md @@ -0,0 +1,17 @@ + + +# ListAcmeAccounts + +listAcmeAccounts is a command lists acme external accounts for a cert issuer + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**certIssuerName** | **String** | The name of the PKI certificate issuer | +**json** | **Boolean** | Set output format to JSON | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] + + + diff --git a/docs/ListAcmeAccountsOutput.md b/docs/ListAcmeAccountsOutput.md new file mode 100644 index 00000000..c391fe17 --- /dev/null +++ b/docs/ListAcmeAccountsOutput.md @@ -0,0 +1,13 @@ + + +# ListAcmeAccountsOutput + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**accounts** | [**List<AcmeAccount>**](AcmeAccount.md) | | [optional] + + + diff --git a/docs/PKICertificateIssueDetails.md b/docs/PKICertificateIssueDetails.md index 8af02b1d..9c4addb4 100644 --- a/docs/PKICertificateIssueDetails.md +++ b/docs/PKICertificateIssueDetails.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**acmeEnabled** | **Boolean** | | [optional] **allowAnyName** | **Boolean** | | [optional] **allowCopyExtFromCsr** | **Boolean** | | [optional] **allowSubdomains** | **Boolean** | | [optional] @@ -30,6 +31,7 @@ Name | Type | Description | Notes **keyType** | **String** | | [optional] **keyUsageList** | **List<String>** | | [optional] **locality** | **List<String>** | | [optional] +**nonCriticalKeyUsage** | **Boolean** | | [optional] **notBeforeDuration** | **Long** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] **organizationList** | **List<String>** | | [optional] **organizationUnitList** | **List<String>** | | [optional] diff --git a/docs/RoleAssociationDetails.md b/docs/RoleAssociationDetails.md index dbbfa373..33a9e074 100644 --- a/docs/RoleAssociationDetails.md +++ b/docs/RoleAssociationDetails.md @@ -11,6 +11,7 @@ Name | Type | Description | Notes **assocId** | **String** | | [optional] **authMethodName** | **String** | | [optional] **authMethodSubClaims** | **Map<String, List<String>>** | | [optional] +**isSubclaimsWithOperator** | **Boolean** | | [optional] **roleName** | **String** | | [optional] **subClaimsCaseSensitive** | **Boolean** | | [optional] diff --git a/docs/RoleAuthMethodAssociation.md b/docs/RoleAuthMethodAssociation.md index 0c530d35..3ae0d747 100644 --- a/docs/RoleAuthMethodAssociation.md +++ b/docs/RoleAuthMethodAssociation.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **authMethodAccessId** | **String** | | [optional] **authMethodName** | **String** | | [optional] **authMethodSubClaims** | **Map<String, List<String>>** | | [optional] +**isSubclaimsWithOperator** | **Boolean** | | [optional] **subClaimsCaseSensitive** | **Boolean** | | [optional] diff --git a/docs/UpdateClassicKeyCertificate.md b/docs/UpdateClassicKeyCertificate.md index bb1dbcc5..823f274f 100644 --- a/docs/UpdateClassicKeyCertificate.md +++ b/docs/UpdateClassicKeyCertificate.md @@ -9,6 +9,7 @@ UpdateClassicKeyCertificate is a command that updates the certificate for a clas Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **certFileData** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**certificateFormat** | **String** | | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **name** | **String** | ClassicKey name | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/UpdateItem.md b/docs/UpdateItem.md index a9b7e904..55532a87 100644 --- a/docs/UpdateItem.md +++ b/docs/UpdateItem.md @@ -11,6 +11,7 @@ Name | Type | Description | Notes **accessibility** | **String** | for personal password manager | [optional] **addTag** | **List<String>** | List of the new tags that will be attached to this item | [optional] **certFileData** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**certificateFormat** | **String** | | [optional] **changeEvent** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] **deleteProtection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] **description** | **String** | Description of the object | [optional] diff --git a/docs/UpdatePKICertIssuer.md b/docs/UpdatePKICertIssuer.md index bfc70cda..3308224e 100644 --- a/docs/UpdatePKICertIssuer.md +++ b/docs/UpdatePKICertIssuer.md @@ -19,11 +19,13 @@ Name | Type | Description | Notes **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] **createPrivateCrl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] **createPublicCrl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] +**criticalKeyUsage** | **String** | Mark key usage as critical [true/false] | [optional] **deleteProtection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] **description** | **String** | Description of the object | [optional] **destinationPath** | **String** | A path in which to save generated certificates | [optional] +**enableAcme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] **expirationEventIn** | **List<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] -**gwClusterUrl** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] +**gwClusterUrl** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] **isCa** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] **json** | **Boolean** | Set output format to JSON | [optional] **keyUsage** | **String** | key-usage | [optional] diff --git a/docs/V2Api.md b/docs/V2Api.md index c0c594cc..4337e9e7 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -37,6 +37,7 @@ Method | HTTP request | Description [**authMethodUpdateOauth2**](V2Api.md#authMethodUpdateOauth2) | **POST** /auth-method-update-oauth2 | [**authMethodUpdateSAML**](V2Api.md#authMethodUpdateSAML) | **POST** /auth-method-update-saml | [**authMethodUpdateUniversalIdentity**](V2Api.md#authMethodUpdateUniversalIdentity) | **POST** /auth-method-update-universal-identity | +[**changeAdminAccountPassword**](V2Api.md#changeAdminAccountPassword) | **POST** /change-admin-account-password | [**configure**](V2Api.md#configure) | **POST** /configure | [**connect**](V2Api.md#connect) | **POST** /connect | [**createAWSTarget**](V2Api.md#createAWSTarget) | **POST** /create-aws-target | @@ -94,6 +95,7 @@ Method | HTTP request | Description [**createWindowsTarget**](V2Api.md#createWindowsTarget) | **POST** /create-windows-target | [**createZeroSSLTarget**](V2Api.md#createZeroSSLTarget) | **POST** /create-zerossl-target | [**createldapTarget**](V2Api.md#createldapTarget) | **POST** /create-ldap-target | +[**deactivateAcmeAccount**](V2Api.md#deactivateAcmeAccount) | **POST** /deactivate-acme-account | [**decrypt**](V2Api.md#decrypt) | **POST** /decrypt | [**decryptBatch**](V2Api.md#decryptBatch) | **POST** /decrypt-batch | [**decryptGPG**](V2Api.md#decryptGPG) | **POST** /decrypt-gpg | @@ -306,6 +308,7 @@ Method | HTTP request | Description [**gatewayUpdateRemoteAccessRdpRecordings**](V2Api.md#gatewayUpdateRemoteAccessRdpRecordings) | **POST** /gateway-update-remote-access-rdp-recording | [**gatewayUpdateTlsCert**](V2Api.md#gatewayUpdateTlsCert) | **POST** /gateway-update-tls-cert | [**gatewayUpdateTmpUsers**](V2Api.md#gatewayUpdateTmpUsers) | **POST** /gateway-update-producer-tmp-creds | +[**generateAcmeEab**](V2Api.md#generateAcmeEab) | **POST** /generate-acme-eab | [**generateCsr**](V2Api.md#generateCsr) | **POST** /generate-csr | [**getAccountLogo**](V2Api.md#getAccountLogo) | **POST** /get-account-logo | [**getAccountSettings**](V2Api.md#getAccountSettings) | **POST** /get-account-settings | @@ -352,6 +355,7 @@ Method | HTTP request | Description [**kmipRenewServerCertificate**](V2Api.md#kmipRenewServerCertificate) | **POST** /kmip-renew-environment | [**kmipServerSetup**](V2Api.md#kmipServerSetup) | **POST** /kmip-create-environment | [**kmipSetServerState**](V2Api.md#kmipSetServerState) | **POST** /kmip-set-environment-state | +[**listAcmeAccounts**](V2Api.md#listAcmeAccounts) | **POST** /list-acme-accounts | [**listAuthMethods**](V2Api.md#listAuthMethods) | **POST** /list-auth-methods | [**listGateways**](V2Api.md#listGateways) | **POST** /list-gateways | [**listGroups**](V2Api.md#listGroups) | **POST** /list-group | @@ -2572,6 +2576,67 @@ No authorization required **201** | authMethodUpdateUniversalIdentityResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **changeAdminAccountPassword** +> Object changeAdminAccountPassword(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + ChangeAdminAccountPassword body = new ChangeAdminAccountPassword(); // ChangeAdminAccountPassword | + try { + Object result = apiInstance.changeAdminAccountPassword(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#changeAdminAccountPassword"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ChangeAdminAccountPassword**](ChangeAdminAccountPassword.md)| | + +### Return type + +**Object** + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | changeAdminAccountPasswordResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **configure** > ConfigureOutput configure(body) @@ -6049,6 +6114,67 @@ No authorization required **200** | createldapTargetResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **deactivateAcmeAccount** +> Object deactivateAcmeAccount(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + DeactivateAcmeAccount body = new DeactivateAcmeAccount(); // DeactivateAcmeAccount | + try { + Object result = apiInstance.deactivateAcmeAccount(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#deactivateAcmeAccount"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**DeactivateAcmeAccount**](DeactivateAcmeAccount.md)| | + +### Return type + +**Object** + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | deactivateAcmeAccountResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **decrypt** > DecryptOutput decrypt(body) @@ -18974,6 +19100,67 @@ No authorization required **200** | gatewayUpdateTmpUsersResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **generateAcmeEab** +> GenerateAcmeEabOutput generateAcmeEab(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + GenerateAcmeEab body = new GenerateAcmeEab(); // GenerateAcmeEab | + try { + GenerateAcmeEabOutput result = apiInstance.generateAcmeEab(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#generateAcmeEab"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**GenerateAcmeEab**](GenerateAcmeEab.md)| | + +### Return type + +[**GenerateAcmeEabOutput**](GenerateAcmeEabOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | generateAcmeEabResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **generateCsr** > GenerateCsrOutput generateCsr(body) @@ -21776,6 +21963,67 @@ No authorization required **200** | kmipSetServerStateResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **listAcmeAccounts** +> ListAcmeAccountsOutput listAcmeAccounts(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + ListAcmeAccounts body = new ListAcmeAccounts(); // ListAcmeAccounts | + try { + ListAcmeAccountsOutput result = apiInstance.listAcmeAccounts(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#listAcmeAccounts"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ListAcmeAccounts**](ListAcmeAccounts.md)| | + +### Return type + +[**ListAcmeAccountsOutput**](ListAcmeAccountsOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | listAcmeAccountsResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **listAuthMethods** > ListAuthMethodsOutput listAuthMethods(body) diff --git a/pom.xml b/pom.xml index bff8e219..a92c9225 100644 --- a/pom.xml +++ b/pom.xml @@ -5,7 +5,7 @@ akeyless-java jar akeyless-java - 4.2.4 + 4.2.5 https://github.com/akeylesslabs/akeyless-java Akeyless Java SDK diff --git a/src/main/java/io/akeyless/client/ApiClient.java b/src/main/java/io/akeyless/client/ApiClient.java index 13ea99e9..4ea8b1a1 100644 --- a/src/main/java/io/akeyless/client/ApiClient.java +++ b/src/main/java/io/akeyless/client/ApiClient.java @@ -129,7 +129,7 @@ private void init() { json = new JSON(); // Set default User-Agent. - setUserAgent("OpenAPI-Generator/4.2.4/java"); + setUserAgent("OpenAPI-Generator/4.2.5/java"); authentications = new HashMap(); } diff --git a/src/main/java/io/akeyless/client/api/V2Api.java b/src/main/java/io/akeyless/client/api/V2Api.java index f5f805be..e5eb8d83 100644 --- a/src/main/java/io/akeyless/client/api/V2Api.java +++ b/src/main/java/io/akeyless/client/api/V2Api.java @@ -73,6 +73,7 @@ import io.akeyless.client.model.BatchEncryptionRequestLine; import io.akeyless.client.model.BatchTokenizationRequestLine; import io.akeyless.client.model.CacheConfigPart; +import io.akeyless.client.model.ChangeAdminAccountPassword; import io.akeyless.client.model.Configure; import io.akeyless.client.model.ConfigureOutput; import io.akeyless.client.model.Connect; @@ -187,6 +188,7 @@ import io.akeyless.client.model.CreateZeroSSLTarget; import io.akeyless.client.model.CreateZeroSSLTargetOutput; import io.akeyless.client.model.DSProducerDetails; +import io.akeyless.client.model.DeactivateAcmeAccount; import io.akeyless.client.model.Decrypt; import io.akeyless.client.model.DecryptGPG; import io.akeyless.client.model.DecryptGPGOutput; @@ -499,6 +501,8 @@ import io.akeyless.client.model.GatewayUpdateTlsCertOutput; import io.akeyless.client.model.GatewayUpdateTmpUsers; import io.akeyless.client.model.GatewaysListResponse; +import io.akeyless.client.model.GenerateAcmeEab; +import io.akeyless.client.model.GenerateAcmeEabOutput; import io.akeyless.client.model.GenerateCsr; import io.akeyless.client.model.GenerateCsrOutput; import io.akeyless.client.model.GetAccountSettings; @@ -570,6 +574,8 @@ import io.akeyless.client.model.KmipServerSetup; import io.akeyless.client.model.KmipSetServerState; import io.akeyless.client.model.KmipSetServerStateOutput; +import io.akeyless.client.model.ListAcmeAccounts; +import io.akeyless.client.model.ListAcmeAccountsOutput; import io.akeyless.client.model.ListAuthMethods; import io.akeyless.client.model.ListAuthMethodsOutput; import io.akeyless.client.model.ListGateways; @@ -5224,6 +5230,137 @@ public okhttp3.Call authMethodUpdateUniversalIdentityAsync(AuthMethodUpdateUnive localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } + /** + * Build call for changeAdminAccountPassword + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 changeAdminAccountPasswordResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call changeAdminAccountPasswordCall(ChangeAdminAccountPassword body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/change-admin-account-password"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call changeAdminAccountPasswordValidateBeforeCall(ChangeAdminAccountPassword body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling changeAdminAccountPassword(Async)"); + } + + + okhttp3.Call localVarCall = changeAdminAccountPasswordCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return Object + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 changeAdminAccountPasswordResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public Object changeAdminAccountPassword(ChangeAdminAccountPassword body) throws ApiException { + ApiResponse localVarResp = changeAdminAccountPasswordWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<Object> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 changeAdminAccountPasswordResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse changeAdminAccountPasswordWithHttpInfo(ChangeAdminAccountPassword body) throws ApiException { + okhttp3.Call localVarCall = changeAdminAccountPasswordValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 changeAdminAccountPasswordResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call changeAdminAccountPasswordAsync(ChangeAdminAccountPassword body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = changeAdminAccountPasswordValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for configure * @param body (required) @@ -12691,6 +12828,137 @@ public okhttp3.Call createldapTargetAsync(CreateLdapTarget body, final ApiCallba localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } + /** + * Build call for deactivateAcmeAccount + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 deactivateAcmeAccountResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call deactivateAcmeAccountCall(DeactivateAcmeAccount body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/deactivate-acme-account"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call deactivateAcmeAccountValidateBeforeCall(DeactivateAcmeAccount body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling deactivateAcmeAccount(Async)"); + } + + + okhttp3.Call localVarCall = deactivateAcmeAccountCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return Object + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 deactivateAcmeAccountResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public Object deactivateAcmeAccount(DeactivateAcmeAccount body) throws ApiException { + ApiResponse localVarResp = deactivateAcmeAccountWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<Object> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 deactivateAcmeAccountResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse deactivateAcmeAccountWithHttpInfo(DeactivateAcmeAccount body) throws ApiException { + okhttp3.Call localVarCall = deactivateAcmeAccountValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 deactivateAcmeAccountResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call deactivateAcmeAccountAsync(DeactivateAcmeAccount body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = deactivateAcmeAccountValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for decrypt * @param body (required) @@ -40417,6 +40685,137 @@ public okhttp3.Call gatewayUpdateTmpUsersAsync(GatewayUpdateTmpUsers body, final localVarApiClient.executeAsync(localVarCall, _callback); return localVarCall; } + /** + * Build call for generateAcmeEab + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 generateAcmeEabResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call generateAcmeEabCall(GenerateAcmeEab body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/generate-acme-eab"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call generateAcmeEabValidateBeforeCall(GenerateAcmeEab body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling generateAcmeEab(Async)"); + } + + + okhttp3.Call localVarCall = generateAcmeEabCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return GenerateAcmeEabOutput + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 generateAcmeEabResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public GenerateAcmeEabOutput generateAcmeEab(GenerateAcmeEab body) throws ApiException { + ApiResponse localVarResp = generateAcmeEabWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<GenerateAcmeEabOutput> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 generateAcmeEabResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse generateAcmeEabWithHttpInfo(GenerateAcmeEab body) throws ApiException { + okhttp3.Call localVarCall = generateAcmeEabValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 generateAcmeEabResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call generateAcmeEabAsync(GenerateAcmeEab body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = generateAcmeEabValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for generateCsr * @param body (required) @@ -46369,6 +46768,137 @@ public okhttp3.Call kmipSetServerStateAsync(KmipSetServerState body, final ApiCa localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } + /** + * Build call for listAcmeAccounts + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 listAcmeAccountsResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call listAcmeAccountsCall(ListAcmeAccounts body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/list-acme-accounts"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call listAcmeAccountsValidateBeforeCall(ListAcmeAccounts body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling listAcmeAccounts(Async)"); + } + + + okhttp3.Call localVarCall = listAcmeAccountsCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return ListAcmeAccountsOutput + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 listAcmeAccountsResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ListAcmeAccountsOutput listAcmeAccounts(ListAcmeAccounts body) throws ApiException { + ApiResponse localVarResp = listAcmeAccountsWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<ListAcmeAccountsOutput> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
200 listAcmeAccountsResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse listAcmeAccountsWithHttpInfo(ListAcmeAccounts body) throws ApiException { + okhttp3.Call localVarCall = listAcmeAccountsValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
200 listAcmeAccountsResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call listAcmeAccountsAsync(ListAcmeAccounts body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = listAcmeAccountsValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for listAuthMethods * @param body (required) diff --git a/src/main/java/io/akeyless/client/model/AcmeAccount.java b/src/main/java/io/akeyless/client/model/AcmeAccount.java new file mode 100644 index 00000000..a73b4862 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/AcmeAccount.java @@ -0,0 +1,159 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * AcmeAccount is copied without the jwk as it seems like it has issues with sdk + */ +@ApiModel(description = "AcmeAccount is copied without the jwk as it seems like it has issues with sdk") +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class AcmeAccount { + public static final String SERIALIZED_NAME_ACCOUNT_ID = "account_id"; + @SerializedName(SERIALIZED_NAME_ACCOUNT_ID) + private String accountId; + + public static final String SERIALIZED_NAME_KEY_DIGEST = "key_digest"; + @SerializedName(SERIALIZED_NAME_KEY_DIGEST) + private String keyDigest; + + public static final String SERIALIZED_NAME_STATUS = "status"; + @SerializedName(SERIALIZED_NAME_STATUS) + private String status; + + public AcmeAccount() { + } + + public AcmeAccount accountId(String accountId) { + + this.accountId = accountId; + return this; + } + + /** + * AccountId is the ACME account id, not Akeyless account id + * @return accountId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "AccountId is the ACME account id, not Akeyless account id") + + public String getAccountId() { + return accountId; + } + + + public void setAccountId(String accountId) { + this.accountId = accountId; + } + + + public AcmeAccount keyDigest(String keyDigest) { + + this.keyDigest = keyDigest; + return this; + } + + /** + * Get keyDigest + * @return keyDigest + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getKeyDigest() { + return keyDigest; + } + + + public void setKeyDigest(String keyDigest) { + this.keyDigest = keyDigest; + } + + + public AcmeAccount status(String status) { + + this.status = status; + return this; + } + + /** + * Get status + * @return status + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getStatus() { + return status; + } + + + public void setStatus(String status) { + this.status = status; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + AcmeAccount acmeAccount = (AcmeAccount) o; + return Objects.equals(this.accountId, acmeAccount.accountId) && + Objects.equals(this.keyDigest, acmeAccount.keyDigest) && + Objects.equals(this.status, acmeAccount.status); + } + + @Override + public int hashCode() { + return Objects.hash(accountId, keyDigest, status); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class AcmeAccount {\n"); + sb.append(" accountId: ").append(toIndentedString(accountId)).append("\n"); + sb.append(" keyDigest: ").append(toIndentedString(keyDigest)).append("\n"); + sb.append(" status: ").append(toIndentedString(status)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/AuthMethodRoleAssociation.java b/src/main/java/io/akeyless/client/model/AuthMethodRoleAssociation.java index e51925cc..7504f94b 100644 --- a/src/main/java/io/akeyless/client/model/AuthMethodRoleAssociation.java +++ b/src/main/java/io/akeyless/client/model/AuthMethodRoleAssociation.java @@ -51,6 +51,10 @@ public class AuthMethodRoleAssociation { @SerializedName(SERIALIZED_NAME_IS_SUB_CLAIMS_CASE_SENSITIVE) private Boolean isSubClaimsCaseSensitive; + public static final String SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR = "is_subclaims_with_operator"; + @SerializedName(SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR) + private Boolean isSubclaimsWithOperator; + public static final String SERIALIZED_NAME_ROLE_NAME = "role_name"; @SerializedName(SERIALIZED_NAME_ROLE_NAME) private String roleName; @@ -170,6 +174,29 @@ public void setIsSubClaimsCaseSensitive(Boolean isSubClaimsCaseSensitive) { } + public AuthMethodRoleAssociation isSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + return this; + } + + /** + * Get isSubclaimsWithOperator + * @return isSubclaimsWithOperator + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getIsSubclaimsWithOperator() { + return isSubclaimsWithOperator; + } + + + public void setIsSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + } + + public AuthMethodRoleAssociation roleName(String roleName) { this.roleName = roleName; @@ -229,13 +256,14 @@ public boolean equals(Object o) { Objects.equals(this.assocId, authMethodRoleAssociation.assocId) && Objects.equals(this.authMethodSubClaims, authMethodRoleAssociation.authMethodSubClaims) && Objects.equals(this.isSubClaimsCaseSensitive, authMethodRoleAssociation.isSubClaimsCaseSensitive) && + Objects.equals(this.isSubclaimsWithOperator, authMethodRoleAssociation.isSubclaimsWithOperator) && Objects.equals(this.roleName, authMethodRoleAssociation.roleName) && Objects.equals(this.rules, authMethodRoleAssociation.rules); } @Override public int hashCode() { - return Objects.hash(allowedOps, assocId, authMethodSubClaims, isSubClaimsCaseSensitive, roleName, rules); + return Objects.hash(allowedOps, assocId, authMethodSubClaims, isSubClaimsCaseSensitive, isSubclaimsWithOperator, roleName, rules); } @Override @@ -246,6 +274,7 @@ public String toString() { sb.append(" assocId: ").append(toIndentedString(assocId)).append("\n"); sb.append(" authMethodSubClaims: ").append(toIndentedString(authMethodSubClaims)).append("\n"); sb.append(" isSubClaimsCaseSensitive: ").append(toIndentedString(isSubClaimsCaseSensitive)).append("\n"); + sb.append(" isSubclaimsWithOperator: ").append(toIndentedString(isSubclaimsWithOperator)).append("\n"); sb.append(" roleName: ").append(toIndentedString(roleName)).append("\n"); sb.append(" rules: ").append(toIndentedString(rules)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/ChangeAdminAccountPassword.java b/src/main/java/io/akeyless/client/model/ChangeAdminAccountPassword.java new file mode 100644 index 00000000..cac33797 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/ChangeAdminAccountPassword.java @@ -0,0 +1,216 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * ChangeAdminAccountPassword + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ChangeAdminAccountPassword { + public static final String SERIALIZED_NAME_CURRENT_PASSWORD = "current-password"; + @SerializedName(SERIALIZED_NAME_CURRENT_PASSWORD) + private String currentPassword; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_NEW_PASSWORD = "new-password"; + @SerializedName(SERIALIZED_NAME_NEW_PASSWORD) + private String newPassword; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public ChangeAdminAccountPassword() { + } + + public ChangeAdminAccountPassword currentPassword(String currentPassword) { + + this.currentPassword = currentPassword; + return this; + } + + /** + * Current password + * @return currentPassword + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "Current password") + + public String getCurrentPassword() { + return currentPassword; + } + + + public void setCurrentPassword(String currentPassword) { + this.currentPassword = currentPassword; + } + + + public ChangeAdminAccountPassword json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public ChangeAdminAccountPassword newPassword(String newPassword) { + + this.newPassword = newPassword; + return this; + } + + /** + * New password + * @return newPassword + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "New password") + + public String getNewPassword() { + return newPassword; + } + + + public void setNewPassword(String newPassword) { + this.newPassword = newPassword; + } + + + public ChangeAdminAccountPassword token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public ChangeAdminAccountPassword uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ChangeAdminAccountPassword changeAdminAccountPassword = (ChangeAdminAccountPassword) o; + return Objects.equals(this.currentPassword, changeAdminAccountPassword.currentPassword) && + Objects.equals(this.json, changeAdminAccountPassword.json) && + Objects.equals(this.newPassword, changeAdminAccountPassword.newPassword) && + Objects.equals(this.token, changeAdminAccountPassword.token) && + Objects.equals(this.uidToken, changeAdminAccountPassword.uidToken); + } + + @Override + public int hashCode() { + return Objects.hash(currentPassword, json, newPassword, token, uidToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ChangeAdminAccountPassword {\n"); + sb.append(" currentPassword: ").append(toIndentedString(currentPassword)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" newPassword: ").append(toIndentedString(newPassword)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java b/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java index f8f0e472..4f9c63a1 100644 --- a/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java +++ b/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java @@ -79,6 +79,10 @@ public class CreatePKICertIssuer { @SerializedName(SERIALIZED_NAME_CREATE_PUBLIC_CRL) private Boolean createPublicCrl; + public static final String SERIALIZED_NAME_CRITICAL_KEY_USAGE = "critical-key-usage"; + @SerializedName(SERIALIZED_NAME_CRITICAL_KEY_USAGE) + private String criticalKeyUsage = "true"; + public static final String SERIALIZED_NAME_DELETE_PROTECTION = "delete_protection"; @SerializedName(SERIALIZED_NAME_DELETE_PROTECTION) private String deleteProtection; @@ -91,6 +95,10 @@ public class CreatePKICertIssuer { @SerializedName(SERIALIZED_NAME_DESTINATION_PATH) private String destinationPath; + public static final String SERIALIZED_NAME_ENABLE_ACME = "enable-acme"; + @SerializedName(SERIALIZED_NAME_ENABLE_ACME) + private Boolean enableAcme; + public static final String SERIALIZED_NAME_EXPIRATION_EVENT_IN = "expiration-event-in"; @SerializedName(SERIALIZED_NAME_EXPIRATION_EVENT_IN) private List expirationEventIn = null; @@ -458,6 +466,29 @@ public void setCreatePublicCrl(Boolean createPublicCrl) { } + public CreatePKICertIssuer criticalKeyUsage(String criticalKeyUsage) { + + this.criticalKeyUsage = criticalKeyUsage; + return this; + } + + /** + * Mark key usage as critical [true/false] + * @return criticalKeyUsage + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Mark key usage as critical [true/false]") + + public String getCriticalKeyUsage() { + return criticalKeyUsage; + } + + + public void setCriticalKeyUsage(String criticalKeyUsage) { + this.criticalKeyUsage = criticalKeyUsage; + } + + public CreatePKICertIssuer deleteProtection(String deleteProtection) { this.deleteProtection = deleteProtection; @@ -527,6 +558,29 @@ public void setDestinationPath(String destinationPath) { } + public CreatePKICertIssuer enableAcme(Boolean enableAcme) { + + this.enableAcme = enableAcme; + return this; + } + + /** + * If set, the cert issuer will support the acme protocol + * @return enableAcme + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "If set, the cert issuer will support the acme protocol") + + public Boolean getEnableAcme() { + return enableAcme; + } + + + public void setEnableAcme(Boolean enableAcme) { + this.enableAcme = enableAcme; + } + + public CreatePKICertIssuer expirationEventIn(List expirationEventIn) { this.expirationEventIn = expirationEventIn; @@ -565,11 +619,11 @@ public CreatePKICertIssuer gwClusterUrl(String gwClusterUrl) { } /** - * The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA + * The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME * @return gwClusterUrl **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA") + @ApiModelProperty(value = "The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME") public String getGwClusterUrl() { return gwClusterUrl; @@ -1070,9 +1124,11 @@ public boolean equals(Object o) { Objects.equals(this.country, createPKICertIssuer.country) && Objects.equals(this.createPrivateCrl, createPKICertIssuer.createPrivateCrl) && Objects.equals(this.createPublicCrl, createPKICertIssuer.createPublicCrl) && + Objects.equals(this.criticalKeyUsage, createPKICertIssuer.criticalKeyUsage) && Objects.equals(this.deleteProtection, createPKICertIssuer.deleteProtection) && Objects.equals(this.description, createPKICertIssuer.description) && Objects.equals(this.destinationPath, createPKICertIssuer.destinationPath) && + Objects.equals(this.enableAcme, createPKICertIssuer.enableAcme) && Objects.equals(this.expirationEventIn, createPKICertIssuer.expirationEventIn) && Objects.equals(this.gwClusterUrl, createPKICertIssuer.gwClusterUrl) && Objects.equals(this.isCa, createPKICertIssuer.isCa) && @@ -1099,7 +1155,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(allowAnyName, allowCopyExtFromCsr, allowSubdomains, allowedDomains, allowedExtraExtensions, allowedUriSans, caTarget, clientFlag, codeSigningFlag, country, createPrivateCrl, createPublicCrl, deleteProtection, description, destinationPath, expirationEventIn, gwClusterUrl, isCa, json, keyUsage, locality, metadata, name, notEnforceHostnames, notRequireCn, organizationalUnits, organizations, postalCode, protectCertificates, province, serverFlag, signerKeyName, streetAddress, tag, token, ttl, uidToken); + return Objects.hash(allowAnyName, allowCopyExtFromCsr, allowSubdomains, allowedDomains, allowedExtraExtensions, allowedUriSans, caTarget, clientFlag, codeSigningFlag, country, createPrivateCrl, createPublicCrl, criticalKeyUsage, deleteProtection, description, destinationPath, enableAcme, expirationEventIn, gwClusterUrl, isCa, json, keyUsage, locality, metadata, name, notEnforceHostnames, notRequireCn, organizationalUnits, organizations, postalCode, protectCertificates, province, serverFlag, signerKeyName, streetAddress, tag, token, ttl, uidToken); } @Override @@ -1118,9 +1174,11 @@ public String toString() { sb.append(" country: ").append(toIndentedString(country)).append("\n"); sb.append(" createPrivateCrl: ").append(toIndentedString(createPrivateCrl)).append("\n"); sb.append(" createPublicCrl: ").append(toIndentedString(createPublicCrl)).append("\n"); + sb.append(" criticalKeyUsage: ").append(toIndentedString(criticalKeyUsage)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" destinationPath: ").append(toIndentedString(destinationPath)).append("\n"); + sb.append(" enableAcme: ").append(toIndentedString(enableAcme)).append("\n"); sb.append(" expirationEventIn: ").append(toIndentedString(expirationEventIn)).append("\n"); sb.append(" gwClusterUrl: ").append(toIndentedString(gwClusterUrl)).append("\n"); sb.append(" isCa: ").append(toIndentedString(isCa)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/DeactivateAcmeAccount.java b/src/main/java/io/akeyless/client/model/DeactivateAcmeAccount.java new file mode 100644 index 00000000..11f50025 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/DeactivateAcmeAccount.java @@ -0,0 +1,246 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * deactivateAcmeAccount is a command that Deactivates \\ Deletes an acme external account + */ +@ApiModel(description = "deactivateAcmeAccount is a command that Deactivates \\ Deletes an acme external account") +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class DeactivateAcmeAccount { + public static final String SERIALIZED_NAME_ACME_ACCOUNT_ID = "acme-account-id"; + @SerializedName(SERIALIZED_NAME_ACME_ACCOUNT_ID) + private String acmeAccountId; + + public static final String SERIALIZED_NAME_CERT_ISSUER_NAME = "cert-issuer-name"; + @SerializedName(SERIALIZED_NAME_CERT_ISSUER_NAME) + private String certIssuerName; + + public static final String SERIALIZED_NAME_DELETE_ACCOUNT = "delete-account"; + @SerializedName(SERIALIZED_NAME_DELETE_ACCOUNT) + private Boolean deleteAccount; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public DeactivateAcmeAccount() { + } + + public DeactivateAcmeAccount acmeAccountId(String acmeAccountId) { + + this.acmeAccountId = acmeAccountId; + return this; + } + + /** + * The acme account id to deactivate + * @return acmeAccountId + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "The acme account id to deactivate") + + public String getAcmeAccountId() { + return acmeAccountId; + } + + + public void setAcmeAccountId(String acmeAccountId) { + this.acmeAccountId = acmeAccountId; + } + + + public DeactivateAcmeAccount certIssuerName(String certIssuerName) { + + this.certIssuerName = certIssuerName; + return this; + } + + /** + * The name of the PKI certificate issuer + * @return certIssuerName + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "The name of the PKI certificate issuer") + + public String getCertIssuerName() { + return certIssuerName; + } + + + public void setCertIssuerName(String certIssuerName) { + this.certIssuerName = certIssuerName; + } + + + public DeactivateAcmeAccount deleteAccount(Boolean deleteAccount) { + + this.deleteAccount = deleteAccount; + return this; + } + + /** + * Delete the account + * @return deleteAccount + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Delete the account") + + public Boolean getDeleteAccount() { + return deleteAccount; + } + + + public void setDeleteAccount(Boolean deleteAccount) { + this.deleteAccount = deleteAccount; + } + + + public DeactivateAcmeAccount json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public DeactivateAcmeAccount token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public DeactivateAcmeAccount uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + DeactivateAcmeAccount deactivateAcmeAccount = (DeactivateAcmeAccount) o; + return Objects.equals(this.acmeAccountId, deactivateAcmeAccount.acmeAccountId) && + Objects.equals(this.certIssuerName, deactivateAcmeAccount.certIssuerName) && + Objects.equals(this.deleteAccount, deactivateAcmeAccount.deleteAccount) && + Objects.equals(this.json, deactivateAcmeAccount.json) && + Objects.equals(this.token, deactivateAcmeAccount.token) && + Objects.equals(this.uidToken, deactivateAcmeAccount.uidToken); + } + + @Override + public int hashCode() { + return Objects.hash(acmeAccountId, certIssuerName, deleteAccount, json, token, uidToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class DeactivateAcmeAccount {\n"); + sb.append(" acmeAccountId: ").append(toIndentedString(acmeAccountId)).append("\n"); + sb.append(" certIssuerName: ").append(toIndentedString(certIssuerName)).append("\n"); + sb.append(" deleteAccount: ").append(toIndentedString(deleteAccount)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/GenerateAcmeEab.java b/src/main/java/io/akeyless/client/model/GenerateAcmeEab.java new file mode 100644 index 00000000..4044863d --- /dev/null +++ b/src/main/java/io/akeyless/client/model/GenerateAcmeEab.java @@ -0,0 +1,187 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * GenerateAcmeEab + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class GenerateAcmeEab { + public static final String SERIALIZED_NAME_CERT_ISSUER_NAME = "cert-issuer-name"; + @SerializedName(SERIALIZED_NAME_CERT_ISSUER_NAME) + private String certIssuerName; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public GenerateAcmeEab() { + } + + public GenerateAcmeEab certIssuerName(String certIssuerName) { + + this.certIssuerName = certIssuerName; + return this; + } + + /** + * The name of the PKI certificate issuer + * @return certIssuerName + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "The name of the PKI certificate issuer") + + public String getCertIssuerName() { + return certIssuerName; + } + + + public void setCertIssuerName(String certIssuerName) { + this.certIssuerName = certIssuerName; + } + + + public GenerateAcmeEab json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public GenerateAcmeEab token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public GenerateAcmeEab uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + GenerateAcmeEab generateAcmeEab = (GenerateAcmeEab) o; + return Objects.equals(this.certIssuerName, generateAcmeEab.certIssuerName) && + Objects.equals(this.json, generateAcmeEab.json) && + Objects.equals(this.token, generateAcmeEab.token) && + Objects.equals(this.uidToken, generateAcmeEab.uidToken); + } + + @Override + public int hashCode() { + return Objects.hash(certIssuerName, json, token, uidToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class GenerateAcmeEab {\n"); + sb.append(" certIssuerName: ").append(toIndentedString(certIssuerName)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/GenerateAcmeEabOutput.java b/src/main/java/io/akeyless/client/model/GenerateAcmeEabOutput.java new file mode 100644 index 00000000..cc9d0b7b --- /dev/null +++ b/src/main/java/io/akeyless/client/model/GenerateAcmeEabOutput.java @@ -0,0 +1,159 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.threeten.bp.OffsetDateTime; + +/** + * GenerateAcmeEabOutput + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class GenerateAcmeEabOutput { + public static final String SERIALIZED_NAME_EXPIRES_AT = "expires_at"; + @SerializedName(SERIALIZED_NAME_EXPIRES_AT) + private OffsetDateTime expiresAt; + + public static final String SERIALIZED_NAME_KID = "kid"; + @SerializedName(SERIALIZED_NAME_KID) + private String kid; + + public static final String SERIALIZED_NAME_MAC_KEY = "mac_key"; + @SerializedName(SERIALIZED_NAME_MAC_KEY) + private String macKey; + + public GenerateAcmeEabOutput() { + } + + public GenerateAcmeEabOutput expiresAt(OffsetDateTime expiresAt) { + + this.expiresAt = expiresAt; + return this; + } + + /** + * Get expiresAt + * @return expiresAt + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public OffsetDateTime getExpiresAt() { + return expiresAt; + } + + + public void setExpiresAt(OffsetDateTime expiresAt) { + this.expiresAt = expiresAt; + } + + + public GenerateAcmeEabOutput kid(String kid) { + + this.kid = kid; + return this; + } + + /** + * Get kid + * @return kid + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getKid() { + return kid; + } + + + public void setKid(String kid) { + this.kid = kid; + } + + + public GenerateAcmeEabOutput macKey(String macKey) { + + this.macKey = macKey; + return this; + } + + /** + * Get macKey + * @return macKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getMacKey() { + return macKey; + } + + + public void setMacKey(String macKey) { + this.macKey = macKey; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + GenerateAcmeEabOutput generateAcmeEabOutput = (GenerateAcmeEabOutput) o; + return Objects.equals(this.expiresAt, generateAcmeEabOutput.expiresAt) && + Objects.equals(this.kid, generateAcmeEabOutput.kid) && + Objects.equals(this.macKey, generateAcmeEabOutput.macKey); + } + + @Override + public int hashCode() { + return Objects.hash(expiresAt, kid, macKey); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class GenerateAcmeEabOutput {\n"); + sb.append(" expiresAt: ").append(toIndentedString(expiresAt)).append("\n"); + sb.append(" kid: ").append(toIndentedString(kid)).append("\n"); + sb.append(" macKey: ").append(toIndentedString(macKey)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/GetGroupOutput.java b/src/main/java/io/akeyless/client/model/GetGroupOutput.java index e16dda72..9948bb1c 100644 --- a/src/main/java/io/akeyless/client/model/GetGroupOutput.java +++ b/src/main/java/io/akeyless/client/model/GetGroupOutput.java @@ -57,6 +57,10 @@ public class GetGroupOutput { @SerializedName(SERIALIZED_NAME_GROUP_NAME) private String groupName; + public static final String SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR = "is_subclaims_with_operator"; + @SerializedName(SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR) + private Boolean isSubclaimsWithOperator; + public static final String SERIALIZED_NAME_MODIFICATION_DATE = "modification_date"; @SerializedName(SERIALIZED_NAME_MODIFICATION_DATE) private OffsetDateTime modificationDate; @@ -206,6 +210,29 @@ public void setGroupName(String groupName) { } + public GetGroupOutput isSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + return this; + } + + /** + * Get isSubclaimsWithOperator + * @return isSubclaimsWithOperator + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getIsSubclaimsWithOperator() { + return isSubclaimsWithOperator; + } + + + public void setIsSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + } + + public GetGroupOutput modificationDate(OffsetDateTime modificationDate) { this.modificationDate = modificationDate; @@ -275,13 +302,14 @@ public boolean equals(Object o) { Objects.equals(this.groupAlias, getGroupOutput.groupAlias) && Objects.equals(this.groupId, getGroupOutput.groupId) && Objects.equals(this.groupName, getGroupOutput.groupName) && + Objects.equals(this.isSubclaimsWithOperator, getGroupOutput.isSubclaimsWithOperator) && Objects.equals(this.modificationDate, getGroupOutput.modificationDate) && Objects.equals(this.userAssignments, getGroupOutput.userAssignments); } @Override public int hashCode() { - return Objects.hash(accountId, creationDate, description, groupAlias, groupId, groupName, modificationDate, userAssignments); + return Objects.hash(accountId, creationDate, description, groupAlias, groupId, groupName, isSubclaimsWithOperator, modificationDate, userAssignments); } @Override @@ -294,6 +322,7 @@ public String toString() { sb.append(" groupAlias: ").append(toIndentedString(groupAlias)).append("\n"); sb.append(" groupId: ").append(toIndentedString(groupId)).append("\n"); sb.append(" groupName: ").append(toIndentedString(groupName)).append("\n"); + sb.append(" isSubclaimsWithOperator: ").append(toIndentedString(isSubclaimsWithOperator)).append("\n"); sb.append(" modificationDate: ").append(toIndentedString(modificationDate)).append("\n"); sb.append(" userAssignments: ").append(toIndentedString(userAssignments)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java b/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java index 17c99eee..de7c7ad6 100644 --- a/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java +++ b/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java @@ -207,11 +207,11 @@ public GetKubeExecCreds extendedKeyUsage(String extendedKeyUsage) { } /** - * A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. + * A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical * @return extendedKeyUsage **/ @javax.annotation.Nullable - @ApiModelProperty(value = "A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'.") + @ApiModelProperty(value = "A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical") public String getExtendedKeyUsage() { return extendedKeyUsage; diff --git a/src/main/java/io/akeyless/client/model/GetPKICertificate.java b/src/main/java/io/akeyless/client/model/GetPKICertificate.java index 1a737b63..baf02c82 100644 --- a/src/main/java/io/akeyless/client/model/GetPKICertificate.java +++ b/src/main/java/io/akeyless/client/model/GetPKICertificate.java @@ -179,11 +179,11 @@ public GetPKICertificate extendedKeyUsage(String extendedKeyUsage) { } /** - * A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. + * A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical * @return extendedKeyUsage **/ @javax.annotation.Nullable - @ApiModelProperty(value = "A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'.") + @ApiModelProperty(value = "A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical") public String getExtendedKeyUsage() { return extendedKeyUsage; diff --git a/src/main/java/io/akeyless/client/model/Group.java b/src/main/java/io/akeyless/client/model/Group.java index 98c8c865..209fd9a2 100644 --- a/src/main/java/io/akeyless/client/model/Group.java +++ b/src/main/java/io/akeyless/client/model/Group.java @@ -57,6 +57,10 @@ public class Group { @SerializedName(SERIALIZED_NAME_GROUP_NAME) private String groupName; + public static final String SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR = "is_subclaims_with_operator"; + @SerializedName(SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR) + private Boolean isSubclaimsWithOperator; + public static final String SERIALIZED_NAME_MODIFICATION_DATE = "modification_date"; @SerializedName(SERIALIZED_NAME_MODIFICATION_DATE) private OffsetDateTime modificationDate; @@ -206,6 +210,29 @@ public void setGroupName(String groupName) { } + public Group isSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + return this; + } + + /** + * Get isSubclaimsWithOperator + * @return isSubclaimsWithOperator + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getIsSubclaimsWithOperator() { + return isSubclaimsWithOperator; + } + + + public void setIsSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + } + + public Group modificationDate(OffsetDateTime modificationDate) { this.modificationDate = modificationDate; @@ -275,13 +302,14 @@ public boolean equals(Object o) { Objects.equals(this.groupAlias, group.groupAlias) && Objects.equals(this.groupId, group.groupId) && Objects.equals(this.groupName, group.groupName) && + Objects.equals(this.isSubclaimsWithOperator, group.isSubclaimsWithOperator) && Objects.equals(this.modificationDate, group.modificationDate) && Objects.equals(this.userAssignments, group.userAssignments); } @Override public int hashCode() { - return Objects.hash(accountId, creationDate, description, groupAlias, groupId, groupName, modificationDate, userAssignments); + return Objects.hash(accountId, creationDate, description, groupAlias, groupId, groupName, isSubclaimsWithOperator, modificationDate, userAssignments); } @Override @@ -294,6 +322,7 @@ public String toString() { sb.append(" groupAlias: ").append(toIndentedString(groupAlias)).append("\n"); sb.append(" groupId: ").append(toIndentedString(groupId)).append("\n"); sb.append(" groupName: ").append(toIndentedString(groupName)).append("\n"); + sb.append(" isSubclaimsWithOperator: ").append(toIndentedString(isSubclaimsWithOperator)).append("\n"); sb.append(" modificationDate: ").append(toIndentedString(modificationDate)).append("\n"); sb.append(" userAssignments: ").append(toIndentedString(userAssignments)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/ListAcmeAccounts.java b/src/main/java/io/akeyless/client/model/ListAcmeAccounts.java new file mode 100644 index 00000000..456df02a --- /dev/null +++ b/src/main/java/io/akeyless/client/model/ListAcmeAccounts.java @@ -0,0 +1,188 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * listAcmeAccounts is a command lists acme external accounts for a cert issuer + */ +@ApiModel(description = "listAcmeAccounts is a command lists acme external accounts for a cert issuer") +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ListAcmeAccounts { + public static final String SERIALIZED_NAME_CERT_ISSUER_NAME = "cert-issuer-name"; + @SerializedName(SERIALIZED_NAME_CERT_ISSUER_NAME) + private String certIssuerName; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public ListAcmeAccounts() { + } + + public ListAcmeAccounts certIssuerName(String certIssuerName) { + + this.certIssuerName = certIssuerName; + return this; + } + + /** + * The name of the PKI certificate issuer + * @return certIssuerName + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "The name of the PKI certificate issuer") + + public String getCertIssuerName() { + return certIssuerName; + } + + + public void setCertIssuerName(String certIssuerName) { + this.certIssuerName = certIssuerName; + } + + + public ListAcmeAccounts json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public ListAcmeAccounts token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public ListAcmeAccounts uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ListAcmeAccounts listAcmeAccounts = (ListAcmeAccounts) o; + return Objects.equals(this.certIssuerName, listAcmeAccounts.certIssuerName) && + Objects.equals(this.json, listAcmeAccounts.json) && + Objects.equals(this.token, listAcmeAccounts.token) && + Objects.equals(this.uidToken, listAcmeAccounts.uidToken); + } + + @Override + public int hashCode() { + return Objects.hash(certIssuerName, json, token, uidToken); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ListAcmeAccounts {\n"); + sb.append(" certIssuerName: ").append(toIndentedString(certIssuerName)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/ListAcmeAccountsOutput.java b/src/main/java/io/akeyless/client/model/ListAcmeAccountsOutput.java new file mode 100644 index 00000000..7bb428c4 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/ListAcmeAccountsOutput.java @@ -0,0 +1,111 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.AcmeAccount; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; + +/** + * ListAcmeAccountsOutput + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class ListAcmeAccountsOutput { + public static final String SERIALIZED_NAME_ACCOUNTS = "accounts"; + @SerializedName(SERIALIZED_NAME_ACCOUNTS) + private List accounts = null; + + public ListAcmeAccountsOutput() { + } + + public ListAcmeAccountsOutput accounts(List accounts) { + + this.accounts = accounts; + return this; + } + + public ListAcmeAccountsOutput addAccountsItem(AcmeAccount accountsItem) { + if (this.accounts == null) { + this.accounts = new ArrayList(); + } + this.accounts.add(accountsItem); + return this; + } + + /** + * Get accounts + * @return accounts + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public List getAccounts() { + return accounts; + } + + + public void setAccounts(List accounts) { + this.accounts = accounts; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + ListAcmeAccountsOutput listAcmeAccountsOutput = (ListAcmeAccountsOutput) o; + return Objects.equals(this.accounts, listAcmeAccountsOutput.accounts); + } + + @Override + public int hashCode() { + return Objects.hash(accounts); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class ListAcmeAccountsOutput {\n"); + sb.append(" accounts: ").append(toIndentedString(accounts)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/PKICertificateIssueDetails.java b/src/main/java/io/akeyless/client/model/PKICertificateIssueDetails.java index 39a35ed5..85b72378 100644 --- a/src/main/java/io/akeyless/client/model/PKICertificateIssueDetails.java +++ b/src/main/java/io/akeyless/client/model/PKICertificateIssueDetails.java @@ -34,6 +34,10 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class PKICertificateIssueDetails { + public static final String SERIALIZED_NAME_ACME_ENABLED = "acme_enabled"; + @SerializedName(SERIALIZED_NAME_ACME_ENABLED) + private Boolean acmeEnabled; + public static final String SERIALIZED_NAME_ALLOW_ANY_NAME = "allow_any_name"; @SerializedName(SERIALIZED_NAME_ALLOW_ANY_NAME) private Boolean allowAnyName; @@ -126,6 +130,10 @@ public class PKICertificateIssueDetails { @SerializedName(SERIALIZED_NAME_LOCALITY) private List locality = null; + public static final String SERIALIZED_NAME_NON_CRITICAL_KEY_USAGE = "non_critical_key_usage"; + @SerializedName(SERIALIZED_NAME_NON_CRITICAL_KEY_USAGE) + private Boolean nonCriticalKeyUsage; + public static final String SERIALIZED_NAME_NOT_BEFORE_DURATION = "not_before_duration"; @SerializedName(SERIALIZED_NAME_NOT_BEFORE_DURATION) private Long notBeforeDuration; @@ -165,6 +173,29 @@ public class PKICertificateIssueDetails { public PKICertificateIssueDetails() { } + public PKICertificateIssueDetails acmeEnabled(Boolean acmeEnabled) { + + this.acmeEnabled = acmeEnabled; + return this; + } + + /** + * Get acmeEnabled + * @return acmeEnabled + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getAcmeEnabled() { + return acmeEnabled; + } + + + public void setAcmeEnabled(Boolean acmeEnabled) { + this.acmeEnabled = acmeEnabled; + } + + public PKICertificateIssueDetails allowAnyName(Boolean allowAnyName) { this.allowAnyName = allowAnyName; @@ -750,6 +781,29 @@ public void setLocality(List locality) { } + public PKICertificateIssueDetails nonCriticalKeyUsage(Boolean nonCriticalKeyUsage) { + + this.nonCriticalKeyUsage = nonCriticalKeyUsage; + return this; + } + + /** + * Get nonCriticalKeyUsage + * @return nonCriticalKeyUsage + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getNonCriticalKeyUsage() { + return nonCriticalKeyUsage; + } + + + public void setNonCriticalKeyUsage(Boolean nonCriticalKeyUsage) { + this.nonCriticalKeyUsage = nonCriticalKeyUsage; + } + + public PKICertificateIssueDetails notBeforeDuration(Long notBeforeDuration) { this.notBeforeDuration = notBeforeDuration; @@ -1006,7 +1060,8 @@ public boolean equals(Object o) { return false; } PKICertificateIssueDetails pkICertificateIssueDetails = (PKICertificateIssueDetails) o; - return Objects.equals(this.allowAnyName, pkICertificateIssueDetails.allowAnyName) && + return Objects.equals(this.acmeEnabled, pkICertificateIssueDetails.acmeEnabled) && + Objects.equals(this.allowAnyName, pkICertificateIssueDetails.allowAnyName) && Objects.equals(this.allowCopyExtFromCsr, pkICertificateIssueDetails.allowCopyExtFromCsr) && Objects.equals(this.allowSubdomains, pkICertificateIssueDetails.allowSubdomains) && Objects.equals(this.allowedDomainsList, pkICertificateIssueDetails.allowedDomainsList) && @@ -1029,6 +1084,7 @@ public boolean equals(Object o) { Objects.equals(this.keyType, pkICertificateIssueDetails.keyType) && Objects.equals(this.keyUsageList, pkICertificateIssueDetails.keyUsageList) && Objects.equals(this.locality, pkICertificateIssueDetails.locality) && + Objects.equals(this.nonCriticalKeyUsage, pkICertificateIssueDetails.nonCriticalKeyUsage) && Objects.equals(this.notBeforeDuration, pkICertificateIssueDetails.notBeforeDuration) && Objects.equals(this.organizationList, pkICertificateIssueDetails.organizationList) && Objects.equals(this.organizationUnitList, pkICertificateIssueDetails.organizationUnitList) && @@ -1042,13 +1098,14 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(allowAnyName, allowCopyExtFromCsr, allowSubdomains, allowedDomainsList, allowedExtraExtensions, allowedUriSans, basicConstraintsValidForNonCa, certificateAuthorityMode, clientFlag, codeSigningFlag, country, createPrivateCrl, createPublicCrl, destinationPath, enforceHostnames, expirationEvents, gwClusterId, gwClusterUrl, isCa, keyBits, keyType, keyUsageList, locality, notBeforeDuration, organizationList, organizationUnitList, postalCode, protectGeneratedCertificates, province, requireCn, serverFlag, streetAddress); + return Objects.hash(acmeEnabled, allowAnyName, allowCopyExtFromCsr, allowSubdomains, allowedDomainsList, allowedExtraExtensions, allowedUriSans, basicConstraintsValidForNonCa, certificateAuthorityMode, clientFlag, codeSigningFlag, country, createPrivateCrl, createPublicCrl, destinationPath, enforceHostnames, expirationEvents, gwClusterId, gwClusterUrl, isCa, keyBits, keyType, keyUsageList, locality, nonCriticalKeyUsage, notBeforeDuration, organizationList, organizationUnitList, postalCode, protectGeneratedCertificates, province, requireCn, serverFlag, streetAddress); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class PKICertificateIssueDetails {\n"); + sb.append(" acmeEnabled: ").append(toIndentedString(acmeEnabled)).append("\n"); sb.append(" allowAnyName: ").append(toIndentedString(allowAnyName)).append("\n"); sb.append(" allowCopyExtFromCsr: ").append(toIndentedString(allowCopyExtFromCsr)).append("\n"); sb.append(" allowSubdomains: ").append(toIndentedString(allowSubdomains)).append("\n"); @@ -1072,6 +1129,7 @@ public String toString() { sb.append(" keyType: ").append(toIndentedString(keyType)).append("\n"); sb.append(" keyUsageList: ").append(toIndentedString(keyUsageList)).append("\n"); sb.append(" locality: ").append(toIndentedString(locality)).append("\n"); + sb.append(" nonCriticalKeyUsage: ").append(toIndentedString(nonCriticalKeyUsage)).append("\n"); sb.append(" notBeforeDuration: ").append(toIndentedString(notBeforeDuration)).append("\n"); sb.append(" organizationList: ").append(toIndentedString(organizationList)).append("\n"); sb.append(" organizationUnitList: ").append(toIndentedString(organizationUnitList)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/RoleAssociationDetails.java b/src/main/java/io/akeyless/client/model/RoleAssociationDetails.java index 1962dbea..01ebfc5a 100644 --- a/src/main/java/io/akeyless/client/model/RoleAssociationDetails.java +++ b/src/main/java/io/akeyless/client/model/RoleAssociationDetails.java @@ -45,6 +45,10 @@ public class RoleAssociationDetails { @SerializedName(SERIALIZED_NAME_AUTH_METHOD_SUB_CLAIMS) private Map> authMethodSubClaims = null; + public static final String SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR = "is_subclaims_with_operator"; + @SerializedName(SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR) + private Boolean isSubclaimsWithOperator; + public static final String SERIALIZED_NAME_ROLE_NAME = "role_name"; @SerializedName(SERIALIZED_NAME_ROLE_NAME) private String roleName; @@ -133,6 +137,29 @@ public void setAuthMethodSubClaims(Map> authMethodSubClaims } + public RoleAssociationDetails isSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + return this; + } + + /** + * Get isSubclaimsWithOperator + * @return isSubclaimsWithOperator + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getIsSubclaimsWithOperator() { + return isSubclaimsWithOperator; + } + + + public void setIsSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + } + + public RoleAssociationDetails roleName(String roleName) { this.roleName = roleName; @@ -191,13 +218,14 @@ public boolean equals(Object o) { return Objects.equals(this.assocId, roleAssociationDetails.assocId) && Objects.equals(this.authMethodName, roleAssociationDetails.authMethodName) && Objects.equals(this.authMethodSubClaims, roleAssociationDetails.authMethodSubClaims) && + Objects.equals(this.isSubclaimsWithOperator, roleAssociationDetails.isSubclaimsWithOperator) && Objects.equals(this.roleName, roleAssociationDetails.roleName) && Objects.equals(this.subClaimsCaseSensitive, roleAssociationDetails.subClaimsCaseSensitive); } @Override public int hashCode() { - return Objects.hash(assocId, authMethodName, authMethodSubClaims, roleName, subClaimsCaseSensitive); + return Objects.hash(assocId, authMethodName, authMethodSubClaims, isSubclaimsWithOperator, roleName, subClaimsCaseSensitive); } @Override @@ -207,6 +235,7 @@ public String toString() { sb.append(" assocId: ").append(toIndentedString(assocId)).append("\n"); sb.append(" authMethodName: ").append(toIndentedString(authMethodName)).append("\n"); sb.append(" authMethodSubClaims: ").append(toIndentedString(authMethodSubClaims)).append("\n"); + sb.append(" isSubclaimsWithOperator: ").append(toIndentedString(isSubclaimsWithOperator)).append("\n"); sb.append(" roleName: ").append(toIndentedString(roleName)).append("\n"); sb.append(" subClaimsCaseSensitive: ").append(toIndentedString(subClaimsCaseSensitive)).append("\n"); sb.append("}"); diff --git a/src/main/java/io/akeyless/client/model/RoleAuthMethodAssociation.java b/src/main/java/io/akeyless/client/model/RoleAuthMethodAssociation.java index cc2ba24c..95ce04cb 100644 --- a/src/main/java/io/akeyless/client/model/RoleAuthMethodAssociation.java +++ b/src/main/java/io/akeyless/client/model/RoleAuthMethodAssociation.java @@ -49,6 +49,10 @@ public class RoleAuthMethodAssociation { @SerializedName(SERIALIZED_NAME_AUTH_METHOD_SUB_CLAIMS) private Map> authMethodSubClaims = null; + public static final String SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR = "is_subclaims_with_operator"; + @SerializedName(SERIALIZED_NAME_IS_SUBCLAIMS_WITH_OPERATOR) + private Boolean isSubclaimsWithOperator; + public static final String SERIALIZED_NAME_SUB_CLAIMS_CASE_SENSITIVE = "sub_claims_case_sensitive"; @SerializedName(SERIALIZED_NAME_SUB_CLAIMS_CASE_SENSITIVE) private Boolean subClaimsCaseSensitive; @@ -156,6 +160,29 @@ public void setAuthMethodSubClaims(Map> authMethodSubClaims } + public RoleAuthMethodAssociation isSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + return this; + } + + /** + * Get isSubclaimsWithOperator + * @return isSubclaimsWithOperator + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getIsSubclaimsWithOperator() { + return isSubclaimsWithOperator; + } + + + public void setIsSubclaimsWithOperator(Boolean isSubclaimsWithOperator) { + this.isSubclaimsWithOperator = isSubclaimsWithOperator; + } + + public RoleAuthMethodAssociation subClaimsCaseSensitive(Boolean subClaimsCaseSensitive) { this.subClaimsCaseSensitive = subClaimsCaseSensitive; @@ -192,12 +219,13 @@ public boolean equals(Object o) { Objects.equals(this.authMethodAccessId, roleAuthMethodAssociation.authMethodAccessId) && Objects.equals(this.authMethodName, roleAuthMethodAssociation.authMethodName) && Objects.equals(this.authMethodSubClaims, roleAuthMethodAssociation.authMethodSubClaims) && + Objects.equals(this.isSubclaimsWithOperator, roleAuthMethodAssociation.isSubclaimsWithOperator) && Objects.equals(this.subClaimsCaseSensitive, roleAuthMethodAssociation.subClaimsCaseSensitive); } @Override public int hashCode() { - return Objects.hash(assocId, authMethodAccessId, authMethodName, authMethodSubClaims, subClaimsCaseSensitive); + return Objects.hash(assocId, authMethodAccessId, authMethodName, authMethodSubClaims, isSubclaimsWithOperator, subClaimsCaseSensitive); } @Override @@ -208,6 +236,7 @@ public String toString() { sb.append(" authMethodAccessId: ").append(toIndentedString(authMethodAccessId)).append("\n"); sb.append(" authMethodName: ").append(toIndentedString(authMethodName)).append("\n"); sb.append(" authMethodSubClaims: ").append(toIndentedString(authMethodSubClaims)).append("\n"); + sb.append(" isSubclaimsWithOperator: ").append(toIndentedString(isSubclaimsWithOperator)).append("\n"); sb.append(" subClaimsCaseSensitive: ").append(toIndentedString(subClaimsCaseSensitive)).append("\n"); sb.append("}"); return sb.toString(); diff --git a/src/main/java/io/akeyless/client/model/UpdateClassicKeyCertificate.java b/src/main/java/io/akeyless/client/model/UpdateClassicKeyCertificate.java index 2a6f2b30..7ce39bbb 100644 --- a/src/main/java/io/akeyless/client/model/UpdateClassicKeyCertificate.java +++ b/src/main/java/io/akeyless/client/model/UpdateClassicKeyCertificate.java @@ -34,6 +34,10 @@ public class UpdateClassicKeyCertificate { @SerializedName(SERIALIZED_NAME_CERT_FILE_DATA) private String certFileData; + public static final String SERIALIZED_NAME_CERTIFICATE_FORMAT = "certificate-format"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_FORMAT) + private String certificateFormat; + public static final String SERIALIZED_NAME_JSON = "json"; @SerializedName(SERIALIZED_NAME_JSON) private Boolean json = false; @@ -76,6 +80,29 @@ public void setCertFileData(String certFileData) { } + public UpdateClassicKeyCertificate certificateFormat(String certificateFormat) { + + this.certificateFormat = certificateFormat; + return this; + } + + /** + * Get certificateFormat + * @return certificateFormat + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getCertificateFormat() { + return certificateFormat; + } + + + public void setCertificateFormat(String certificateFormat) { + this.certificateFormat = certificateFormat; + } + + public UpdateClassicKeyCertificate json(Boolean json) { this.json = json; @@ -178,6 +205,7 @@ public boolean equals(Object o) { } UpdateClassicKeyCertificate updateClassicKeyCertificate = (UpdateClassicKeyCertificate) o; return Objects.equals(this.certFileData, updateClassicKeyCertificate.certFileData) && + Objects.equals(this.certificateFormat, updateClassicKeyCertificate.certificateFormat) && Objects.equals(this.json, updateClassicKeyCertificate.json) && Objects.equals(this.name, updateClassicKeyCertificate.name) && Objects.equals(this.token, updateClassicKeyCertificate.token) && @@ -186,7 +214,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(certFileData, json, name, token, uidToken); + return Objects.hash(certFileData, certificateFormat, json, name, token, uidToken); } @Override @@ -194,6 +222,7 @@ public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class UpdateClassicKeyCertificate {\n"); sb.append(" certFileData: ").append(toIndentedString(certFileData)).append("\n"); + sb.append(" certificateFormat: ").append(toIndentedString(certificateFormat)).append("\n"); sb.append(" json: ").append(toIndentedString(json)).append("\n"); sb.append(" name: ").append(toIndentedString(name)).append("\n"); sb.append(" token: ").append(toIndentedString(token)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateItem.java b/src/main/java/io/akeyless/client/model/UpdateItem.java index afbfbf4f..614557b3 100644 --- a/src/main/java/io/akeyless/client/model/UpdateItem.java +++ b/src/main/java/io/akeyless/client/model/UpdateItem.java @@ -47,6 +47,10 @@ public class UpdateItem { @SerializedName(SERIALIZED_NAME_CERT_FILE_DATA) private String certFileData; + public static final String SERIALIZED_NAME_CERTIFICATE_FORMAT = "certificate-format"; + @SerializedName(SERIALIZED_NAME_CERTIFICATE_FORMAT) + private String certificateFormat; + public static final String SERIALIZED_NAME_CHANGE_EVENT = "change-event"; @SerializedName(SERIALIZED_NAME_CHANGE_EVENT) private String changeEvent; @@ -306,6 +310,29 @@ public void setCertFileData(String certFileData) { } + public UpdateItem certificateFormat(String certificateFormat) { + + this.certificateFormat = certificateFormat; + return this; + } + + /** + * Get certificateFormat + * @return certificateFormat + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getCertificateFormat() { + return certificateFormat; + } + + + public void setCertificateFormat(String certificateFormat) { + this.certificateFormat = certificateFormat; + } + + public UpdateItem changeEvent(String changeEvent) { this.changeEvent = changeEvent; @@ -1256,6 +1283,7 @@ public boolean equals(Object o) { Objects.equals(this.accessibility, updateItem.accessibility) && Objects.equals(this.addTag, updateItem.addTag) && Objects.equals(this.certFileData, updateItem.certFileData) && + Objects.equals(this.certificateFormat, updateItem.certificateFormat) && Objects.equals(this.changeEvent, updateItem.changeEvent) && Objects.equals(this.deleteProtection, updateItem.deleteProtection) && Objects.equals(this.description, updateItem.description) && @@ -1299,7 +1327,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(providerType, accessibility, addTag, certFileData, changeEvent, deleteProtection, description, expirationEventIn, hostProvider, json, maxVersions, name, newMetadata, newName, rmTag, rotateAfterDisconnect, secureAccessAddHost, secureAccessAllowExternalUser, secureAccessAllowPortForwading, secureAccessAwsAccountId, secureAccessAwsNativeCli, secureAccessAwsRegion, secureAccessBastionApi, secureAccessBastionIssuer, secureAccessBastionSsh, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessDbName, secureAccessDbSchema, secureAccessEnable, secureAccessHost, secureAccessRdGatewayServer, secureAccessRdpDomain, secureAccessRdpUser, secureAccessRmHost, secureAccessSshCreds, secureAccessSshCredsUser, secureAccessUrl, secureAccessUseInternalBastion, secureAccessWebBrowsing, secureAccessWebProxy, token, uidToken); + return Objects.hash(providerType, accessibility, addTag, certFileData, certificateFormat, changeEvent, deleteProtection, description, expirationEventIn, hostProvider, json, maxVersions, name, newMetadata, newName, rmTag, rotateAfterDisconnect, secureAccessAddHost, secureAccessAllowExternalUser, secureAccessAllowPortForwading, secureAccessAwsAccountId, secureAccessAwsNativeCli, secureAccessAwsRegion, secureAccessBastionApi, secureAccessBastionIssuer, secureAccessBastionSsh, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessDbName, secureAccessDbSchema, secureAccessEnable, secureAccessHost, secureAccessRdGatewayServer, secureAccessRdpDomain, secureAccessRdpUser, secureAccessRmHost, secureAccessSshCreds, secureAccessSshCredsUser, secureAccessUrl, secureAccessUseInternalBastion, secureAccessWebBrowsing, secureAccessWebProxy, token, uidToken); } @Override @@ -1310,6 +1338,7 @@ public String toString() { sb.append(" accessibility: ").append(toIndentedString(accessibility)).append("\n"); sb.append(" addTag: ").append(toIndentedString(addTag)).append("\n"); sb.append(" certFileData: ").append(toIndentedString(certFileData)).append("\n"); + sb.append(" certificateFormat: ").append(toIndentedString(certificateFormat)).append("\n"); sb.append(" changeEvent: ").append(toIndentedString(changeEvent)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java b/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java index c48969b1..dc29cd46 100644 --- a/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java +++ b/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java @@ -79,6 +79,10 @@ public class UpdatePKICertIssuer { @SerializedName(SERIALIZED_NAME_CREATE_PUBLIC_CRL) private Boolean createPublicCrl; + public static final String SERIALIZED_NAME_CRITICAL_KEY_USAGE = "critical-key-usage"; + @SerializedName(SERIALIZED_NAME_CRITICAL_KEY_USAGE) + private String criticalKeyUsage = "true"; + public static final String SERIALIZED_NAME_DELETE_PROTECTION = "delete_protection"; @SerializedName(SERIALIZED_NAME_DELETE_PROTECTION) private String deleteProtection; @@ -91,6 +95,10 @@ public class UpdatePKICertIssuer { @SerializedName(SERIALIZED_NAME_DESTINATION_PATH) private String destinationPath; + public static final String SERIALIZED_NAME_ENABLE_ACME = "enable-acme"; + @SerializedName(SERIALIZED_NAME_ENABLE_ACME) + private Boolean enableAcme; + public static final String SERIALIZED_NAME_EXPIRATION_EVENT_IN = "expiration-event-in"; @SerializedName(SERIALIZED_NAME_EXPIRATION_EVENT_IN) private List expirationEventIn = null; @@ -470,6 +478,29 @@ public void setCreatePublicCrl(Boolean createPublicCrl) { } + public UpdatePKICertIssuer criticalKeyUsage(String criticalKeyUsage) { + + this.criticalKeyUsage = criticalKeyUsage; + return this; + } + + /** + * Mark key usage as critical [true/false] + * @return criticalKeyUsage + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Mark key usage as critical [true/false]") + + public String getCriticalKeyUsage() { + return criticalKeyUsage; + } + + + public void setCriticalKeyUsage(String criticalKeyUsage) { + this.criticalKeyUsage = criticalKeyUsage; + } + + public UpdatePKICertIssuer deleteProtection(String deleteProtection) { this.deleteProtection = deleteProtection; @@ -539,6 +570,29 @@ public void setDestinationPath(String destinationPath) { } + public UpdatePKICertIssuer enableAcme(Boolean enableAcme) { + + this.enableAcme = enableAcme; + return this; + } + + /** + * If set, the cert issuer will support the acme protocol + * @return enableAcme + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "If set, the cert issuer will support the acme protocol") + + public Boolean getEnableAcme() { + return enableAcme; + } + + + public void setEnableAcme(Boolean enableAcme) { + this.enableAcme = enableAcme; + } + + public UpdatePKICertIssuer expirationEventIn(List expirationEventIn) { this.expirationEventIn = expirationEventIn; @@ -577,11 +631,11 @@ public UpdatePKICertIssuer gwClusterUrl(String gwClusterUrl) { } /** - * The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA + * The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME * @return gwClusterUrl **/ @javax.annotation.Nullable - @ApiModelProperty(value = "The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA") + @ApiModelProperty(value = "The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME") public String getGwClusterUrl() { return gwClusterUrl; @@ -1105,9 +1159,11 @@ public boolean equals(Object o) { Objects.equals(this.country, updatePKICertIssuer.country) && Objects.equals(this.createPrivateCrl, updatePKICertIssuer.createPrivateCrl) && Objects.equals(this.createPublicCrl, updatePKICertIssuer.createPublicCrl) && + Objects.equals(this.criticalKeyUsage, updatePKICertIssuer.criticalKeyUsage) && Objects.equals(this.deleteProtection, updatePKICertIssuer.deleteProtection) && Objects.equals(this.description, updatePKICertIssuer.description) && Objects.equals(this.destinationPath, updatePKICertIssuer.destinationPath) && + Objects.equals(this.enableAcme, updatePKICertIssuer.enableAcme) && Objects.equals(this.expirationEventIn, updatePKICertIssuer.expirationEventIn) && Objects.equals(this.gwClusterUrl, updatePKICertIssuer.gwClusterUrl) && Objects.equals(this.isCa, updatePKICertIssuer.isCa) && @@ -1135,7 +1191,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(addTag, allowAnyName, allowCopyExtFromCsr, allowSubdomains, allowedDomains, allowedExtraExtensions, allowedUriSans, clientFlag, codeSigningFlag, country, createPrivateCrl, createPublicCrl, deleteProtection, description, destinationPath, expirationEventIn, gwClusterUrl, isCa, json, keyUsage, locality, metadata, name, newName, notEnforceHostnames, notRequireCn, organizationalUnits, organizations, postalCode, protectCertificates, province, rmTag, serverFlag, signerKeyName, streetAddress, token, ttl, uidToken); + return Objects.hash(addTag, allowAnyName, allowCopyExtFromCsr, allowSubdomains, allowedDomains, allowedExtraExtensions, allowedUriSans, clientFlag, codeSigningFlag, country, createPrivateCrl, createPublicCrl, criticalKeyUsage, deleteProtection, description, destinationPath, enableAcme, expirationEventIn, gwClusterUrl, isCa, json, keyUsage, locality, metadata, name, newName, notEnforceHostnames, notRequireCn, organizationalUnits, organizations, postalCode, protectCertificates, province, rmTag, serverFlag, signerKeyName, streetAddress, token, ttl, uidToken); } @Override @@ -1154,9 +1210,11 @@ public String toString() { sb.append(" country: ").append(toIndentedString(country)).append("\n"); sb.append(" createPrivateCrl: ").append(toIndentedString(createPrivateCrl)).append("\n"); sb.append(" createPublicCrl: ").append(toIndentedString(createPublicCrl)).append("\n"); + sb.append(" criticalKeyUsage: ").append(toIndentedString(criticalKeyUsage)).append("\n"); sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); sb.append(" description: ").append(toIndentedString(description)).append("\n"); sb.append(" destinationPath: ").append(toIndentedString(destinationPath)).append("\n"); + sb.append(" enableAcme: ").append(toIndentedString(enableAcme)).append("\n"); sb.append(" expirationEventIn: ").append(toIndentedString(expirationEventIn)).append("\n"); sb.append(" gwClusterUrl: ").append(toIndentedString(gwClusterUrl)).append("\n"); sb.append(" isCa: ").append(toIndentedString(isCa)).append("\n"); diff --git a/src/test/java/io/akeyless/client/model/AcmeAccountTest.java b/src/test/java/io/akeyless/client/model/AcmeAccountTest.java new file mode 100644 index 00000000..de1d24dc --- /dev/null +++ b/src/test/java/io/akeyless/client/model/AcmeAccountTest.java @@ -0,0 +1,67 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for AcmeAccount + */ +public class AcmeAccountTest { + private final AcmeAccount model = new AcmeAccount(); + + /** + * Model tests for AcmeAccount + */ + @Test + public void testAcmeAccount() { + // TODO: test AcmeAccount + } + + /** + * Test the property 'accountId' + */ + @Test + public void accountIdTest() { + // TODO: test accountId + } + + /** + * Test the property 'keyDigest' + */ + @Test + public void keyDigestTest() { + // TODO: test keyDigest + } + + /** + * Test the property 'status' + */ + @Test + public void statusTest() { + // TODO: test status + } + +} diff --git a/src/test/java/io/akeyless/client/model/ChangeAdminAccountPasswordTest.java b/src/test/java/io/akeyless/client/model/ChangeAdminAccountPasswordTest.java new file mode 100644 index 00000000..39d9e141 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/ChangeAdminAccountPasswordTest.java @@ -0,0 +1,83 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for ChangeAdminAccountPassword + */ +public class ChangeAdminAccountPasswordTest { + private final ChangeAdminAccountPassword model = new ChangeAdminAccountPassword(); + + /** + * Model tests for ChangeAdminAccountPassword + */ + @Test + public void testChangeAdminAccountPassword() { + // TODO: test ChangeAdminAccountPassword + } + + /** + * Test the property 'currentPassword' + */ + @Test + public void currentPasswordTest() { + // TODO: test currentPassword + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'newPassword' + */ + @Test + public void newPasswordTest() { + // TODO: test newPassword + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + +} diff --git a/src/test/java/io/akeyless/client/model/DeactivateAcmeAccountTest.java b/src/test/java/io/akeyless/client/model/DeactivateAcmeAccountTest.java new file mode 100644 index 00000000..fe3f9995 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/DeactivateAcmeAccountTest.java @@ -0,0 +1,91 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for DeactivateAcmeAccount + */ +public class DeactivateAcmeAccountTest { + private final DeactivateAcmeAccount model = new DeactivateAcmeAccount(); + + /** + * Model tests for DeactivateAcmeAccount + */ + @Test + public void testDeactivateAcmeAccount() { + // TODO: test DeactivateAcmeAccount + } + + /** + * Test the property 'acmeAccountId' + */ + @Test + public void acmeAccountIdTest() { + // TODO: test acmeAccountId + } + + /** + * Test the property 'certIssuerName' + */ + @Test + public void certIssuerNameTest() { + // TODO: test certIssuerName + } + + /** + * Test the property 'deleteAccount' + */ + @Test + public void deleteAccountTest() { + // TODO: test deleteAccount + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + +} diff --git a/src/test/java/io/akeyless/client/model/GenerateAcmeEabOutputTest.java b/src/test/java/io/akeyless/client/model/GenerateAcmeEabOutputTest.java new file mode 100644 index 00000000..98cf575a --- /dev/null +++ b/src/test/java/io/akeyless/client/model/GenerateAcmeEabOutputTest.java @@ -0,0 +1,68 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.threeten.bp.OffsetDateTime; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for GenerateAcmeEabOutput + */ +public class GenerateAcmeEabOutputTest { + private final GenerateAcmeEabOutput model = new GenerateAcmeEabOutput(); + + /** + * Model tests for GenerateAcmeEabOutput + */ + @Test + public void testGenerateAcmeEabOutput() { + // TODO: test GenerateAcmeEabOutput + } + + /** + * Test the property 'expiresAt' + */ + @Test + public void expiresAtTest() { + // TODO: test expiresAt + } + + /** + * Test the property 'kid' + */ + @Test + public void kidTest() { + // TODO: test kid + } + + /** + * Test the property 'macKey' + */ + @Test + public void macKeyTest() { + // TODO: test macKey + } + +} diff --git a/src/test/java/io/akeyless/client/model/GenerateAcmeEabTest.java b/src/test/java/io/akeyless/client/model/GenerateAcmeEabTest.java new file mode 100644 index 00000000..22ab7a33 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/GenerateAcmeEabTest.java @@ -0,0 +1,75 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for GenerateAcmeEab + */ +public class GenerateAcmeEabTest { + private final GenerateAcmeEab model = new GenerateAcmeEab(); + + /** + * Model tests for GenerateAcmeEab + */ + @Test + public void testGenerateAcmeEab() { + // TODO: test GenerateAcmeEab + } + + /** + * Test the property 'certIssuerName' + */ + @Test + public void certIssuerNameTest() { + // TODO: test certIssuerName + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + +} diff --git a/src/test/java/io/akeyless/client/model/ListAcmeAccountsOutputTest.java b/src/test/java/io/akeyless/client/model/ListAcmeAccountsOutputTest.java new file mode 100644 index 00000000..9ce511fb --- /dev/null +++ b/src/test/java/io/akeyless/client/model/ListAcmeAccountsOutputTest.java @@ -0,0 +1,54 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.AcmeAccount; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for ListAcmeAccountsOutput + */ +public class ListAcmeAccountsOutputTest { + private final ListAcmeAccountsOutput model = new ListAcmeAccountsOutput(); + + /** + * Model tests for ListAcmeAccountsOutput + */ + @Test + public void testListAcmeAccountsOutput() { + // TODO: test ListAcmeAccountsOutput + } + + /** + * Test the property 'accounts' + */ + @Test + public void accountsTest() { + // TODO: test accounts + } + +} diff --git a/src/test/java/io/akeyless/client/model/ListAcmeAccountsTest.java b/src/test/java/io/akeyless/client/model/ListAcmeAccountsTest.java new file mode 100644 index 00000000..8c81ea2b --- /dev/null +++ b/src/test/java/io/akeyless/client/model/ListAcmeAccountsTest.java @@ -0,0 +1,75 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for ListAcmeAccounts + */ +public class ListAcmeAccountsTest { + private final ListAcmeAccounts model = new ListAcmeAccounts(); + + /** + * Model tests for ListAcmeAccounts + */ + @Test + public void testListAcmeAccounts() { + // TODO: test ListAcmeAccounts + } + + /** + * Test the property 'certIssuerName' + */ + @Test + public void certIssuerNameTest() { + // TODO: test certIssuerName + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + +}