From 51a72296238472e8157e9b2f78457a436e64ddd4 Mon Sep 17 00:00:00 2001 From: akeyless Date: Mon, 7 Oct 2024 07:19:47 +0000 Subject: [PATCH] "Release v4.2.5" --- README.md | 13 +- akeyless/__init__.py | 9 +- akeyless/api/v2_api.py | 464 ++++++++++++++++++ akeyless/api_client.py | 2 +- akeyless/configuration.py | 2 +- akeyless/models/__init__.py | 7 + akeyless/models/acme_account.py | 175 +++++++ .../models/auth_method_role_association.py | 28 +- .../models/change_admin_account_password.py | 237 +++++++++ akeyless/models/create_pki_cert_issuer.py | 62 ++- akeyless/models/deactivate_acme_account.py | 265 ++++++++++ akeyless/models/generate_acme_eab.py | 208 ++++++++ akeyless/models/generate_acme_eab_output.py | 173 +++++++ akeyless/models/get_group_output.py | 28 +- akeyless/models/get_kube_exec_creds.py | 4 +- akeyless/models/get_pki_certificate.py | 4 +- akeyless/models/group.py | 28 +- akeyless/models/list_acme_accounts.py | 208 ++++++++ akeyless/models/list_acme_accounts_output.py | 121 +++++ .../models/pki_certificate_issue_details.py | 54 +- akeyless/models/role_association_details.py | 28 +- .../models/role_auth_method_association.py | 28 +- .../models/update_classic_key_certificate.py | 28 +- akeyless/models/update_item.py | 28 +- akeyless/models/update_pki_cert_issuer.py | 62 ++- docs/AcmeAccount.md | 13 + docs/AuthMethodRoleAssociation.md | 1 + docs/ChangeAdminAccountPassword.md | 14 + docs/CreatePKICertIssuer.md | 4 +- docs/DeactivateAcmeAccount.md | 16 + docs/GenerateAcmeEab.md | 13 + docs/GenerateAcmeEabOutput.md | 12 + docs/GetGroupOutput.md | 1 + docs/GetKubeExecCreds.md | 2 +- docs/GetPKICertificate.md | 2 +- docs/Group.md | 1 + docs/ListAcmeAccounts.md | 14 + docs/ListAcmeAccountsOutput.md | 10 + docs/PKICertificateIssueDetails.md | 2 + docs/RoleAssociationDetails.md | 1 + docs/RoleAuthMethodAssociation.md | 1 + docs/UpdateClassicKeyCertificate.md | 1 + docs/UpdateItem.md | 1 + docs/UpdatePKICertIssuer.md | 4 +- docs/V2Api.md | 244 +++++++++ setup.py | 2 +- test/test_acme_account.py | 55 +++ test/test_change_admin_account_password.py | 59 +++ test/test_deactivate_acme_account.py | 60 +++ test/test_generate_acme_eab.py | 57 +++ test/test_generate_acme_eab_output.py | 55 +++ test/test_list_acme_accounts.py | 57 +++ test/test_list_acme_accounts_output.py | 58 +++ 53 files changed, 2999 insertions(+), 27 deletions(-) create mode 100644 akeyless/models/acme_account.py create mode 100644 akeyless/models/change_admin_account_password.py create mode 100644 akeyless/models/deactivate_acme_account.py create mode 100644 akeyless/models/generate_acme_eab.py create mode 100644 akeyless/models/generate_acme_eab_output.py create mode 100644 akeyless/models/list_acme_accounts.py create mode 100644 akeyless/models/list_acme_accounts_output.py create mode 100644 docs/AcmeAccount.md create mode 100644 docs/ChangeAdminAccountPassword.md create mode 100644 docs/DeactivateAcmeAccount.md create mode 100644 docs/GenerateAcmeEab.md create mode 100644 docs/GenerateAcmeEabOutput.md create mode 100644 docs/ListAcmeAccounts.md create mode 100644 docs/ListAcmeAccountsOutput.md create mode 100644 test/test_acme_account.py create mode 100644 test/test_change_admin_account_password.py create mode 100644 test/test_deactivate_acme_account.py create mode 100644 test/test_generate_acme_eab.py create mode 100644 test/test_generate_acme_eab_output.py create mode 100644 test/test_list_acme_accounts.py create mode 100644 test/test_list_acme_accounts_output.py diff --git a/README.md b/README.md index 5e779537..110a4b8f 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ The purpose of this application is to provide access to Akeyless API. This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: 2.0 -- Package version: 4.2.4 +- Package version: 4.2.5 - Build package: org.openapitools.codegen.languages.PythonClientCodegen For more information, please visit [http://akeyless.io](http://akeyless.io) @@ -116,6 +116,7 @@ Class | Method | HTTP request | Description *V2Api* | [**auth_method_update_oidc**](docs/V2Api.md#auth_method_update_oidc) | **POST** /auth-method-update-oidc | *V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml | *V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity | +*V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password | *V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure | *V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect | *V2Api* | [**create_artifactory_target**](docs/V2Api.md#create_artifactory_target) | **POST** /create-artifactory-target | @@ -173,6 +174,7 @@ Class | Method | HTTP request | Description *V2Api* | [**create_windows_target**](docs/V2Api.md#create_windows_target) | **POST** /create-windows-target | *V2Api* | [**create_zero_ssl_target**](docs/V2Api.md#create_zero_ssl_target) | **POST** /create-zerossl-target | *V2Api* | [**createldap_target**](docs/V2Api.md#createldap_target) | **POST** /create-ldap-target | +*V2Api* | [**deactivate_acme_account**](docs/V2Api.md#deactivate_acme_account) | **POST** /deactivate-acme-account | *V2Api* | [**decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt | *V2Api* | [**decrypt_batch**](docs/V2Api.md#decrypt_batch) | **POST** /decrypt-batch | *V2Api* | [**decrypt_gpg**](docs/V2Api.md#decrypt_gpg) | **POST** /decrypt-gpg | @@ -385,6 +387,7 @@ Class | Method | HTTP request | Description *V2Api* | [**gateway_update_remote_access_rdp_recordings**](docs/V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording | *V2Api* | [**gateway_update_tls_cert**](docs/V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert | *V2Api* | [**gateway_update_tmp_users**](docs/V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds | +*V2Api* | [**generate_acme_eab**](docs/V2Api.md#generate_acme_eab) | **POST** /generate-acme-eab | *V2Api* | [**generate_csr**](docs/V2Api.md#generate_csr) | **POST** /generate-csr | *V2Api* | [**get_account_logo**](docs/V2Api.md#get_account_logo) | **POST** /get-account-logo | *V2Api* | [**get_account_settings**](docs/V2Api.md#get_account_settings) | **POST** /get-account-settings | @@ -431,6 +434,7 @@ Class | Method | HTTP request | Description *V2Api* | [**kmip_renew_server_certificate**](docs/V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment | *V2Api* | [**kmip_server_setup**](docs/V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment | *V2Api* | [**kmip_set_server_state**](docs/V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state | +*V2Api* | [**list_acme_accounts**](docs/V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts | *V2Api* | [**list_auth_methods**](docs/V2Api.md#list_auth_methods) | **POST** /list-auth-methods | *V2Api* | [**list_gateways**](docs/V2Api.md#list_gateways) | **POST** /list-gateways | *V2Api* | [**list_groups**](docs/V2Api.md#list_groups) | **POST** /list-group | @@ -648,6 +652,7 @@ Class | Method | HTTP request | Description - [AccessPermissionAssignment](docs/AccessPermissionAssignment.md) - [AccountGeneralSettings](docs/AccountGeneralSettings.md) - [AccountObjectVersionSettingsOutput](docs/AccountObjectVersionSettingsOutput.md) + - [AcmeAccount](docs/AcmeAccount.md) - [ActiveDirectoryMigration](docs/ActiveDirectoryMigration.md) - [ActiveDirectoryPayload](docs/ActiveDirectoryPayload.md) - [AddGatewayAllowedAccessId](docs/AddGatewayAllowedAccessId.md) @@ -727,6 +732,7 @@ Class | Method | HTTP request | Description - [CertificateTemplateInfo](docs/CertificateTemplateInfo.md) - [CertificateVersionInfo](docs/CertificateVersionInfo.md) - [CfInfo](docs/CfInfo.md) + - [ChangeAdminAccountPassword](docs/ChangeAdminAccountPassword.md) - [ChefTargetDetails](docs/ChefTargetDetails.md) - [ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md) - [ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md) @@ -857,6 +863,7 @@ Class | Method | HTTP request | Description - [DataProtectionSection](docs/DataProtectionSection.md) - [DatadogForwardingConfig](docs/DatadogForwardingConfig.md) - [DbTargetDetails](docs/DbTargetDetails.md) + - [DeactivateAcmeAccount](docs/DeactivateAcmeAccount.md) - [Decrypt](docs/Decrypt.md) - [DecryptFile](docs/DecryptFile.md) - [DecryptFileOutput](docs/DecryptFileOutput.md) @@ -1200,6 +1207,8 @@ Class | Method | HTTP request | Description - [GcpTargetDetails](docs/GcpTargetDetails.md) - [GenCustomerFragment](docs/GenCustomerFragment.md) - [GeneralConfigPart](docs/GeneralConfigPart.md) + - [GenerateAcmeEab](docs/GenerateAcmeEab.md) + - [GenerateAcmeEabOutput](docs/GenerateAcmeEabOutput.md) - [GenerateCsr](docs/GenerateCsr.md) - [GenerateCsrOutput](docs/GenerateCsrOutput.md) - [GetAccountSettings](docs/GetAccountSettings.md) @@ -1305,6 +1314,8 @@ Class | Method | HTTP request | Description - [LeadershipConfigPart](docs/LeadershipConfigPart.md) - [LinkedDetails](docs/LinkedDetails.md) - [LinkedTargetDetails](docs/LinkedTargetDetails.md) + - [ListAcmeAccounts](docs/ListAcmeAccounts.md) + - [ListAcmeAccountsOutput](docs/ListAcmeAccountsOutput.md) - [ListAuthMethods](docs/ListAuthMethods.md) - [ListAuthMethodsOutput](docs/ListAuthMethodsOutput.md) - [ListGateways](docs/ListGateways.md) diff --git a/akeyless/__init__.py b/akeyless/__init__.py index 4822e950..1db0c3d7 100644 --- a/akeyless/__init__.py +++ b/akeyless/__init__.py @@ -15,7 +15,7 @@ from __future__ import absolute_import -__version__ = "4.2.4" +__version__ = "4.2.5" # import apis into sdk package from akeyless.api.v2_api import V2Api @@ -38,6 +38,7 @@ from akeyless.models.access_permission_assignment import AccessPermissionAssignment from akeyless.models.account_general_settings import AccountGeneralSettings from akeyless.models.account_object_version_settings_output import AccountObjectVersionSettingsOutput +from akeyless.models.acme_account import AcmeAccount from akeyless.models.active_directory_migration import ActiveDirectoryMigration from akeyless.models.active_directory_payload import ActiveDirectoryPayload from akeyless.models.add_gateway_allowed_access_id import AddGatewayAllowedAccessId @@ -117,6 +118,7 @@ from akeyless.models.certificate_template_info import CertificateTemplateInfo from akeyless.models.certificate_version_info import CertificateVersionInfo from akeyless.models.cf_info import CfInfo +from akeyless.models.change_admin_account_password import ChangeAdminAccountPassword from akeyless.models.chef_target_details import ChefTargetDetails from akeyless.models.classic_key_details_info import ClassicKeyDetailsInfo from akeyless.models.classic_key_status_info import ClassicKeyStatusInfo @@ -247,6 +249,7 @@ from akeyless.models.data_protection_section import DataProtectionSection from akeyless.models.datadog_forwarding_config import DatadogForwardingConfig from akeyless.models.db_target_details import DbTargetDetails +from akeyless.models.deactivate_acme_account import DeactivateAcmeAccount from akeyless.models.decrypt import Decrypt from akeyless.models.decrypt_file import DecryptFile from akeyless.models.decrypt_file_output import DecryptFileOutput @@ -590,6 +593,8 @@ from akeyless.models.gcp_target_details import GcpTargetDetails from akeyless.models.gen_customer_fragment import GenCustomerFragment from akeyless.models.general_config_part import GeneralConfigPart +from akeyless.models.generate_acme_eab import GenerateAcmeEab +from akeyless.models.generate_acme_eab_output import GenerateAcmeEabOutput from akeyless.models.generate_csr import GenerateCsr from akeyless.models.generate_csr_output import GenerateCsrOutput from akeyless.models.get_account_settings import GetAccountSettings @@ -695,6 +700,8 @@ from akeyless.models.leadership_config_part import LeadershipConfigPart from akeyless.models.linked_details import LinkedDetails from akeyless.models.linked_target_details import LinkedTargetDetails +from akeyless.models.list_acme_accounts import ListAcmeAccounts +from akeyless.models.list_acme_accounts_output import ListAcmeAccountsOutput from akeyless.models.list_auth_methods import ListAuthMethods from akeyless.models.list_auth_methods_output import ListAuthMethodsOutput from akeyless.models.list_gateways import ListGateways diff --git a/akeyless/api/v2_api.py b/akeyless/api/v2_api.py index a98a4623..5127c8c9 100644 --- a/akeyless/api/v2_api.py +++ b/akeyless/api/v2_api.py @@ -3865,6 +3865,122 @@ def auth_method_update_universal_identity_with_http_info(self, body, **kwargs): _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def change_admin_account_password(self, body, **kwargs): # noqa: E501 + """change_admin_account_password # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.change_admin_account_password(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ChangeAdminAccountPassword body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: object + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.change_admin_account_password_with_http_info(body, **kwargs) # noqa: E501 + + def change_admin_account_password_with_http_info(self, body, **kwargs): # noqa: E501 + """change_admin_account_password # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.change_admin_account_password_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ChangeAdminAccountPassword body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(object, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method change_admin_account_password" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `change_admin_account_password`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/change-admin-account-password', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='object', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def configure(self, body, **kwargs): # noqa: E501 """configure # noqa: E501 @@ -10477,6 +10593,122 @@ def createldap_target_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def deactivate_acme_account(self, body, **kwargs): # noqa: E501 + """deactivate_acme_account # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.deactivate_acme_account(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param DeactivateAcmeAccount body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: object + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.deactivate_acme_account_with_http_info(body, **kwargs) # noqa: E501 + + def deactivate_acme_account_with_http_info(self, body, **kwargs): # noqa: E501 + """deactivate_acme_account # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.deactivate_acme_account_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param DeactivateAcmeAccount body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(object, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method deactivate_acme_account" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `deactivate_acme_account`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/deactivate-acme-account', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='object', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def decrypt(self, body, **kwargs): # noqa: E501 """decrypt # noqa: E501 @@ -35036,6 +35268,122 @@ def gateway_update_tmp_users_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def generate_acme_eab(self, body, **kwargs): # noqa: E501 + """generate_acme_eab # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.generate_acme_eab(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param GenerateAcmeEab body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: GenerateAcmeEabOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.generate_acme_eab_with_http_info(body, **kwargs) # noqa: E501 + + def generate_acme_eab_with_http_info(self, body, **kwargs): # noqa: E501 + """generate_acme_eab # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.generate_acme_eab_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param GenerateAcmeEab body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(GenerateAcmeEabOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method generate_acme_eab" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `generate_acme_eab`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/generate-acme-eab', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='GenerateAcmeEabOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def generate_csr(self, body, **kwargs): # noqa: E501 """generate_csr # noqa: E501 @@ -40307,6 +40655,122 @@ def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def list_acme_accounts(self, body, **kwargs): # noqa: E501 + """list_acme_accounts # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.list_acme_accounts(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ListAcmeAccounts body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: ListAcmeAccountsOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.list_acme_accounts_with_http_info(body, **kwargs) # noqa: E501 + + def list_acme_accounts_with_http_info(self, body, **kwargs): # noqa: E501 + """list_acme_accounts # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.list_acme_accounts_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ListAcmeAccounts body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(ListAcmeAccountsOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method list_acme_accounts" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `list_acme_accounts`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/list-acme-accounts', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='ListAcmeAccountsOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def list_auth_methods(self, body, **kwargs): # noqa: E501 """list_auth_methods # noqa: E501 diff --git a/akeyless/api_client.py b/akeyless/api_client.py index 3469a9ca..51c07fc1 100644 --- a/akeyless/api_client.py +++ b/akeyless/api_client.py @@ -79,7 +79,7 @@ def __init__(self, configuration=None, header_name=None, header_value=None, self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/4.2.4/python' + self.user_agent = 'OpenAPI-Generator/4.2.5/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/akeyless/configuration.py b/akeyless/configuration.py index 28fe887b..461efff1 100644 --- a/akeyless/configuration.py +++ b/akeyless/configuration.py @@ -326,7 +326,7 @@ def to_debug_report(self): "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: 2.0\n"\ - "SDK Package Version: 4.2.4".\ + "SDK Package Version: 4.2.5".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self): diff --git a/akeyless/models/__init__.py b/akeyless/models/__init__.py index 11ad22d2..5404cf98 100644 --- a/akeyless/models/__init__.py +++ b/akeyless/models/__init__.py @@ -24,6 +24,7 @@ from akeyless.models.access_permission_assignment import AccessPermissionAssignment from akeyless.models.account_general_settings import AccountGeneralSettings from akeyless.models.account_object_version_settings_output import AccountObjectVersionSettingsOutput +from akeyless.models.acme_account import AcmeAccount from akeyless.models.active_directory_migration import ActiveDirectoryMigration from akeyless.models.active_directory_payload import ActiveDirectoryPayload from akeyless.models.add_gateway_allowed_access_id import AddGatewayAllowedAccessId @@ -103,6 +104,7 @@ from akeyless.models.certificate_template_info import CertificateTemplateInfo from akeyless.models.certificate_version_info import CertificateVersionInfo from akeyless.models.cf_info import CfInfo +from akeyless.models.change_admin_account_password import ChangeAdminAccountPassword from akeyless.models.chef_target_details import ChefTargetDetails from akeyless.models.classic_key_details_info import ClassicKeyDetailsInfo from akeyless.models.classic_key_status_info import ClassicKeyStatusInfo @@ -233,6 +235,7 @@ from akeyless.models.data_protection_section import DataProtectionSection from akeyless.models.datadog_forwarding_config import DatadogForwardingConfig from akeyless.models.db_target_details import DbTargetDetails +from akeyless.models.deactivate_acme_account import DeactivateAcmeAccount from akeyless.models.decrypt import Decrypt from akeyless.models.decrypt_file import DecryptFile from akeyless.models.decrypt_file_output import DecryptFileOutput @@ -576,6 +579,8 @@ from akeyless.models.gcp_target_details import GcpTargetDetails from akeyless.models.gen_customer_fragment import GenCustomerFragment from akeyless.models.general_config_part import GeneralConfigPart +from akeyless.models.generate_acme_eab import GenerateAcmeEab +from akeyless.models.generate_acme_eab_output import GenerateAcmeEabOutput from akeyless.models.generate_csr import GenerateCsr from akeyless.models.generate_csr_output import GenerateCsrOutput from akeyless.models.get_account_settings import GetAccountSettings @@ -681,6 +686,8 @@ from akeyless.models.leadership_config_part import LeadershipConfigPart from akeyless.models.linked_details import LinkedDetails from akeyless.models.linked_target_details import LinkedTargetDetails +from akeyless.models.list_acme_accounts import ListAcmeAccounts +from akeyless.models.list_acme_accounts_output import ListAcmeAccountsOutput from akeyless.models.list_auth_methods import ListAuthMethods from akeyless.models.list_auth_methods_output import ListAuthMethodsOutput from akeyless.models.list_gateways import ListGateways diff --git a/akeyless/models/acme_account.py b/akeyless/models/acme_account.py new file mode 100644 index 00000000..15db4ed7 --- /dev/null +++ b/akeyless/models/acme_account.py @@ -0,0 +1,175 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class AcmeAccount(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'account_id': 'str', + 'key_digest': 'str', + 'status': 'str' + } + + attribute_map = { + 'account_id': 'account_id', + 'key_digest': 'key_digest', + 'status': 'status' + } + + def __init__(self, account_id=None, key_digest=None, status=None, local_vars_configuration=None): # noqa: E501 + """AcmeAccount - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._account_id = None + self._key_digest = None + self._status = None + self.discriminator = None + + if account_id is not None: + self.account_id = account_id + if key_digest is not None: + self.key_digest = key_digest + if status is not None: + self.status = status + + @property + def account_id(self): + """Gets the account_id of this AcmeAccount. # noqa: E501 + + AccountId is the ACME account id, not Akeyless account id # noqa: E501 + + :return: The account_id of this AcmeAccount. # noqa: E501 + :rtype: str + """ + return self._account_id + + @account_id.setter + def account_id(self, account_id): + """Sets the account_id of this AcmeAccount. + + AccountId is the ACME account id, not Akeyless account id # noqa: E501 + + :param account_id: The account_id of this AcmeAccount. # noqa: E501 + :type: str + """ + + self._account_id = account_id + + @property + def key_digest(self): + """Gets the key_digest of this AcmeAccount. # noqa: E501 + + + :return: The key_digest of this AcmeAccount. # noqa: E501 + :rtype: str + """ + return self._key_digest + + @key_digest.setter + def key_digest(self, key_digest): + """Sets the key_digest of this AcmeAccount. + + + :param key_digest: The key_digest of this AcmeAccount. # noqa: E501 + :type: str + """ + + self._key_digest = key_digest + + @property + def status(self): + """Gets the status of this AcmeAccount. # noqa: E501 + + + :return: The status of this AcmeAccount. # noqa: E501 + :rtype: str + """ + return self._status + + @status.setter + def status(self, status): + """Sets the status of this AcmeAccount. + + + :param status: The status of this AcmeAccount. # noqa: E501 + :type: str + """ + + self._status = status + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, AcmeAccount): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, AcmeAccount): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/auth_method_role_association.py b/akeyless/models/auth_method_role_association.py index 5fb21ab8..612d1e37 100644 --- a/akeyless/models/auth_method_role_association.py +++ b/akeyless/models/auth_method_role_association.py @@ -38,6 +38,7 @@ class AuthMethodRoleAssociation(object): 'assoc_id': 'str', 'auth_method_sub_claims': 'dict(str, list[str])', 'is_sub_claims_case_sensitive': 'bool', + 'is_subclaims_with_operator': 'bool', 'role_name': 'str', 'rules': 'Rules' } @@ -47,11 +48,12 @@ class AuthMethodRoleAssociation(object): 'assoc_id': 'assoc_id', 'auth_method_sub_claims': 'auth_method_sub_claims', 'is_sub_claims_case_sensitive': 'is_sub_claims_case_sensitive', + 'is_subclaims_with_operator': 'is_subclaims_with_operator', 'role_name': 'role_name', 'rules': 'rules' } - def __init__(self, allowed_ops=None, assoc_id=None, auth_method_sub_claims=None, is_sub_claims_case_sensitive=None, role_name=None, rules=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, allowed_ops=None, assoc_id=None, auth_method_sub_claims=None, is_sub_claims_case_sensitive=None, is_subclaims_with_operator=None, role_name=None, rules=None, local_vars_configuration=None): # noqa: E501 """AuthMethodRoleAssociation - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -61,6 +63,7 @@ def __init__(self, allowed_ops=None, assoc_id=None, auth_method_sub_claims=None, self._assoc_id = None self._auth_method_sub_claims = None self._is_sub_claims_case_sensitive = None + self._is_subclaims_with_operator = None self._role_name = None self._rules = None self.discriminator = None @@ -73,6 +76,8 @@ def __init__(self, allowed_ops=None, assoc_id=None, auth_method_sub_claims=None, self.auth_method_sub_claims = auth_method_sub_claims if is_sub_claims_case_sensitive is not None: self.is_sub_claims_case_sensitive = is_sub_claims_case_sensitive + if is_subclaims_with_operator is not None: + self.is_subclaims_with_operator = is_subclaims_with_operator if role_name is not None: self.role_name = role_name if rules is not None: @@ -162,6 +167,27 @@ def is_sub_claims_case_sensitive(self, is_sub_claims_case_sensitive): self._is_sub_claims_case_sensitive = is_sub_claims_case_sensitive + @property + def is_subclaims_with_operator(self): + """Gets the is_subclaims_with_operator of this AuthMethodRoleAssociation. # noqa: E501 + + + :return: The is_subclaims_with_operator of this AuthMethodRoleAssociation. # noqa: E501 + :rtype: bool + """ + return self._is_subclaims_with_operator + + @is_subclaims_with_operator.setter + def is_subclaims_with_operator(self, is_subclaims_with_operator): + """Sets the is_subclaims_with_operator of this AuthMethodRoleAssociation. + + + :param is_subclaims_with_operator: The is_subclaims_with_operator of this AuthMethodRoleAssociation. # noqa: E501 + :type: bool + """ + + self._is_subclaims_with_operator = is_subclaims_with_operator + @property def role_name(self): """Gets the role_name of this AuthMethodRoleAssociation. # noqa: E501 diff --git a/akeyless/models/change_admin_account_password.py b/akeyless/models/change_admin_account_password.py new file mode 100644 index 00000000..8d5f8865 --- /dev/null +++ b/akeyless/models/change_admin_account_password.py @@ -0,0 +1,237 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class ChangeAdminAccountPassword(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'current_password': 'str', + 'json': 'bool', + 'new_password': 'str', + 'token': 'str', + 'uid_token': 'str' + } + + attribute_map = { + 'current_password': 'current-password', + 'json': 'json', + 'new_password': 'new-password', + 'token': 'token', + 'uid_token': 'uid-token' + } + + def __init__(self, current_password=None, json=False, new_password=None, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + """ChangeAdminAccountPassword - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._current_password = None + self._json = None + self._new_password = None + self._token = None + self._uid_token = None + self.discriminator = None + + self.current_password = current_password + if json is not None: + self.json = json + self.new_password = new_password + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + + @property + def current_password(self): + """Gets the current_password of this ChangeAdminAccountPassword. # noqa: E501 + + Current password # noqa: E501 + + :return: The current_password of this ChangeAdminAccountPassword. # noqa: E501 + :rtype: str + """ + return self._current_password + + @current_password.setter + def current_password(self, current_password): + """Sets the current_password of this ChangeAdminAccountPassword. + + Current password # noqa: E501 + + :param current_password: The current_password of this ChangeAdminAccountPassword. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and current_password is None: # noqa: E501 + raise ValueError("Invalid value for `current_password`, must not be `None`") # noqa: E501 + + self._current_password = current_password + + @property + def json(self): + """Gets the json of this ChangeAdminAccountPassword. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this ChangeAdminAccountPassword. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this ChangeAdminAccountPassword. + + Set output format to JSON # noqa: E501 + + :param json: The json of this ChangeAdminAccountPassword. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def new_password(self): + """Gets the new_password of this ChangeAdminAccountPassword. # noqa: E501 + + New password # noqa: E501 + + :return: The new_password of this ChangeAdminAccountPassword. # noqa: E501 + :rtype: str + """ + return self._new_password + + @new_password.setter + def new_password(self, new_password): + """Sets the new_password of this ChangeAdminAccountPassword. + + New password # noqa: E501 + + :param new_password: The new_password of this ChangeAdminAccountPassword. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and new_password is None: # noqa: E501 + raise ValueError("Invalid value for `new_password`, must not be `None`") # noqa: E501 + + self._new_password = new_password + + @property + def token(self): + """Gets the token of this ChangeAdminAccountPassword. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this ChangeAdminAccountPassword. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this ChangeAdminAccountPassword. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this ChangeAdminAccountPassword. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this ChangeAdminAccountPassword. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this ChangeAdminAccountPassword. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this ChangeAdminAccountPassword. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this ChangeAdminAccountPassword. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, ChangeAdminAccountPassword): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, ChangeAdminAccountPassword): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/create_pki_cert_issuer.py b/akeyless/models/create_pki_cert_issuer.py index 0096e86f..867f1d01 100644 --- a/akeyless/models/create_pki_cert_issuer.py +++ b/akeyless/models/create_pki_cert_issuer.py @@ -46,9 +46,11 @@ class CreatePKICertIssuer(object): 'country': 'str', 'create_private_crl': 'bool', 'create_public_crl': 'bool', + 'critical_key_usage': 'str', 'delete_protection': 'str', 'description': 'str', 'destination_path': 'str', + 'enable_acme': 'bool', 'expiration_event_in': 'list[str]', 'gw_cluster_url': 'str', 'is_ca': 'bool', @@ -86,9 +88,11 @@ class CreatePKICertIssuer(object): 'country': 'country', 'create_private_crl': 'create-private-crl', 'create_public_crl': 'create-public-crl', + 'critical_key_usage': 'critical-key-usage', 'delete_protection': 'delete_protection', 'description': 'description', 'destination_path': 'destination-path', + 'enable_acme': 'enable-acme', 'expiration_event_in': 'expiration-event-in', 'gw_cluster_url': 'gw-cluster-url', 'is_ca': 'is-ca', @@ -113,7 +117,7 @@ class CreatePKICertIssuer(object): 'uid_token': 'uid-token' } - def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, ca_target=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, delete_protection=None, description=None, destination_path=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, tag=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, ca_target=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, critical_key_usage='true', delete_protection=None, description=None, destination_path=None, enable_acme=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, tag=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 """CreatePKICertIssuer - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -131,9 +135,11 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self._country = None self._create_private_crl = None self._create_public_crl = None + self._critical_key_usage = None self._delete_protection = None self._description = None self._destination_path = None + self._enable_acme = None self._expiration_event_in = None self._gw_cluster_url = None self._is_ca = None @@ -182,12 +188,16 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self.create_private_crl = create_private_crl if create_public_crl is not None: self.create_public_crl = create_public_crl + if critical_key_usage is not None: + self.critical_key_usage = critical_key_usage if delete_protection is not None: self.delete_protection = delete_protection if description is not None: self.description = description if destination_path is not None: self.destination_path = destination_path + if enable_acme is not None: + self.enable_acme = enable_acme if expiration_event_in is not None: self.expiration_event_in = expiration_event_in if gw_cluster_url is not None: @@ -506,6 +516,29 @@ def create_public_crl(self, create_public_crl): self._create_public_crl = create_public_crl + @property + def critical_key_usage(self): + """Gets the critical_key_usage of this CreatePKICertIssuer. # noqa: E501 + + Mark key usage as critical [true/false] # noqa: E501 + + :return: The critical_key_usage of this CreatePKICertIssuer. # noqa: E501 + :rtype: str + """ + return self._critical_key_usage + + @critical_key_usage.setter + def critical_key_usage(self, critical_key_usage): + """Sets the critical_key_usage of this CreatePKICertIssuer. + + Mark key usage as critical [true/false] # noqa: E501 + + :param critical_key_usage: The critical_key_usage of this CreatePKICertIssuer. # noqa: E501 + :type: str + """ + + self._critical_key_usage = critical_key_usage + @property def delete_protection(self): """Gets the delete_protection of this CreatePKICertIssuer. # noqa: E501 @@ -575,6 +608,29 @@ def destination_path(self, destination_path): self._destination_path = destination_path + @property + def enable_acme(self): + """Gets the enable_acme of this CreatePKICertIssuer. # noqa: E501 + + If set, the cert issuer will support the acme protocol # noqa: E501 + + :return: The enable_acme of this CreatePKICertIssuer. # noqa: E501 + :rtype: bool + """ + return self._enable_acme + + @enable_acme.setter + def enable_acme(self, enable_acme): + """Sets the enable_acme of this CreatePKICertIssuer. + + If set, the cert issuer will support the acme protocol # noqa: E501 + + :param enable_acme: The enable_acme of this CreatePKICertIssuer. # noqa: E501 + :type: bool + """ + + self._enable_acme = enable_acme + @property def expiration_event_in(self): """Gets the expiration_event_in of this CreatePKICertIssuer. # noqa: E501 @@ -602,7 +658,7 @@ def expiration_event_in(self, expiration_event_in): def gw_cluster_url(self): """Gets the gw_cluster_url of this CreatePKICertIssuer. # noqa: E501 - The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA # noqa: E501 + The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME # noqa: E501 :return: The gw_cluster_url of this CreatePKICertIssuer. # noqa: E501 :rtype: str @@ -613,7 +669,7 @@ def gw_cluster_url(self): def gw_cluster_url(self, gw_cluster_url): """Sets the gw_cluster_url of this CreatePKICertIssuer. - The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA # noqa: E501 + The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME # noqa: E501 :param gw_cluster_url: The gw_cluster_url of this CreatePKICertIssuer. # noqa: E501 :type: str diff --git a/akeyless/models/deactivate_acme_account.py b/akeyless/models/deactivate_acme_account.py new file mode 100644 index 00000000..aa2bb169 --- /dev/null +++ b/akeyless/models/deactivate_acme_account.py @@ -0,0 +1,265 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class DeactivateAcmeAccount(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'acme_account_id': 'str', + 'cert_issuer_name': 'str', + 'delete_account': 'bool', + 'json': 'bool', + 'token': 'str', + 'uid_token': 'str' + } + + attribute_map = { + 'acme_account_id': 'acme-account-id', + 'cert_issuer_name': 'cert-issuer-name', + 'delete_account': 'delete-account', + 'json': 'json', + 'token': 'token', + 'uid_token': 'uid-token' + } + + def __init__(self, acme_account_id=None, cert_issuer_name=None, delete_account=None, json=False, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + """DeactivateAcmeAccount - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._acme_account_id = None + self._cert_issuer_name = None + self._delete_account = None + self._json = None + self._token = None + self._uid_token = None + self.discriminator = None + + self.acme_account_id = acme_account_id + self.cert_issuer_name = cert_issuer_name + if delete_account is not None: + self.delete_account = delete_account + if json is not None: + self.json = json + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + + @property + def acme_account_id(self): + """Gets the acme_account_id of this DeactivateAcmeAccount. # noqa: E501 + + The acme account id to deactivate # noqa: E501 + + :return: The acme_account_id of this DeactivateAcmeAccount. # noqa: E501 + :rtype: str + """ + return self._acme_account_id + + @acme_account_id.setter + def acme_account_id(self, acme_account_id): + """Sets the acme_account_id of this DeactivateAcmeAccount. + + The acme account id to deactivate # noqa: E501 + + :param acme_account_id: The acme_account_id of this DeactivateAcmeAccount. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and acme_account_id is None: # noqa: E501 + raise ValueError("Invalid value for `acme_account_id`, must not be `None`") # noqa: E501 + + self._acme_account_id = acme_account_id + + @property + def cert_issuer_name(self): + """Gets the cert_issuer_name of this DeactivateAcmeAccount. # noqa: E501 + + The name of the PKI certificate issuer # noqa: E501 + + :return: The cert_issuer_name of this DeactivateAcmeAccount. # noqa: E501 + :rtype: str + """ + return self._cert_issuer_name + + @cert_issuer_name.setter + def cert_issuer_name(self, cert_issuer_name): + """Sets the cert_issuer_name of this DeactivateAcmeAccount. + + The name of the PKI certificate issuer # noqa: E501 + + :param cert_issuer_name: The cert_issuer_name of this DeactivateAcmeAccount. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and cert_issuer_name is None: # noqa: E501 + raise ValueError("Invalid value for `cert_issuer_name`, must not be `None`") # noqa: E501 + + self._cert_issuer_name = cert_issuer_name + + @property + def delete_account(self): + """Gets the delete_account of this DeactivateAcmeAccount. # noqa: E501 + + Delete the account # noqa: E501 + + :return: The delete_account of this DeactivateAcmeAccount. # noqa: E501 + :rtype: bool + """ + return self._delete_account + + @delete_account.setter + def delete_account(self, delete_account): + """Sets the delete_account of this DeactivateAcmeAccount. + + Delete the account # noqa: E501 + + :param delete_account: The delete_account of this DeactivateAcmeAccount. # noqa: E501 + :type: bool + """ + + self._delete_account = delete_account + + @property + def json(self): + """Gets the json of this DeactivateAcmeAccount. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this DeactivateAcmeAccount. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this DeactivateAcmeAccount. + + Set output format to JSON # noqa: E501 + + :param json: The json of this DeactivateAcmeAccount. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def token(self): + """Gets the token of this DeactivateAcmeAccount. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this DeactivateAcmeAccount. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this DeactivateAcmeAccount. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this DeactivateAcmeAccount. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this DeactivateAcmeAccount. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this DeactivateAcmeAccount. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this DeactivateAcmeAccount. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this DeactivateAcmeAccount. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, DeactivateAcmeAccount): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, DeactivateAcmeAccount): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/generate_acme_eab.py b/akeyless/models/generate_acme_eab.py new file mode 100644 index 00000000..21f4f754 --- /dev/null +++ b/akeyless/models/generate_acme_eab.py @@ -0,0 +1,208 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class GenerateAcmeEab(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'cert_issuer_name': 'str', + 'json': 'bool', + 'token': 'str', + 'uid_token': 'str' + } + + attribute_map = { + 'cert_issuer_name': 'cert-issuer-name', + 'json': 'json', + 'token': 'token', + 'uid_token': 'uid-token' + } + + def __init__(self, cert_issuer_name=None, json=False, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + """GenerateAcmeEab - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._cert_issuer_name = None + self._json = None + self._token = None + self._uid_token = None + self.discriminator = None + + self.cert_issuer_name = cert_issuer_name + if json is not None: + self.json = json + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + + @property + def cert_issuer_name(self): + """Gets the cert_issuer_name of this GenerateAcmeEab. # noqa: E501 + + The name of the PKI certificate issuer # noqa: E501 + + :return: The cert_issuer_name of this GenerateAcmeEab. # noqa: E501 + :rtype: str + """ + return self._cert_issuer_name + + @cert_issuer_name.setter + def cert_issuer_name(self, cert_issuer_name): + """Sets the cert_issuer_name of this GenerateAcmeEab. + + The name of the PKI certificate issuer # noqa: E501 + + :param cert_issuer_name: The cert_issuer_name of this GenerateAcmeEab. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and cert_issuer_name is None: # noqa: E501 + raise ValueError("Invalid value for `cert_issuer_name`, must not be `None`") # noqa: E501 + + self._cert_issuer_name = cert_issuer_name + + @property + def json(self): + """Gets the json of this GenerateAcmeEab. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this GenerateAcmeEab. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this GenerateAcmeEab. + + Set output format to JSON # noqa: E501 + + :param json: The json of this GenerateAcmeEab. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def token(self): + """Gets the token of this GenerateAcmeEab. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this GenerateAcmeEab. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this GenerateAcmeEab. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this GenerateAcmeEab. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this GenerateAcmeEab. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this GenerateAcmeEab. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this GenerateAcmeEab. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this GenerateAcmeEab. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, GenerateAcmeEab): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, GenerateAcmeEab): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/generate_acme_eab_output.py b/akeyless/models/generate_acme_eab_output.py new file mode 100644 index 00000000..a3ea329a --- /dev/null +++ b/akeyless/models/generate_acme_eab_output.py @@ -0,0 +1,173 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class GenerateAcmeEabOutput(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'expires_at': 'datetime', + 'kid': 'str', + 'mac_key': 'str' + } + + attribute_map = { + 'expires_at': 'expires_at', + 'kid': 'kid', + 'mac_key': 'mac_key' + } + + def __init__(self, expires_at=None, kid=None, mac_key=None, local_vars_configuration=None): # noqa: E501 + """GenerateAcmeEabOutput - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._expires_at = None + self._kid = None + self._mac_key = None + self.discriminator = None + + if expires_at is not None: + self.expires_at = expires_at + if kid is not None: + self.kid = kid + if mac_key is not None: + self.mac_key = mac_key + + @property + def expires_at(self): + """Gets the expires_at of this GenerateAcmeEabOutput. # noqa: E501 + + + :return: The expires_at of this GenerateAcmeEabOutput. # noqa: E501 + :rtype: datetime + """ + return self._expires_at + + @expires_at.setter + def expires_at(self, expires_at): + """Sets the expires_at of this GenerateAcmeEabOutput. + + + :param expires_at: The expires_at of this GenerateAcmeEabOutput. # noqa: E501 + :type: datetime + """ + + self._expires_at = expires_at + + @property + def kid(self): + """Gets the kid of this GenerateAcmeEabOutput. # noqa: E501 + + + :return: The kid of this GenerateAcmeEabOutput. # noqa: E501 + :rtype: str + """ + return self._kid + + @kid.setter + def kid(self, kid): + """Sets the kid of this GenerateAcmeEabOutput. + + + :param kid: The kid of this GenerateAcmeEabOutput. # noqa: E501 + :type: str + """ + + self._kid = kid + + @property + def mac_key(self): + """Gets the mac_key of this GenerateAcmeEabOutput. # noqa: E501 + + + :return: The mac_key of this GenerateAcmeEabOutput. # noqa: E501 + :rtype: str + """ + return self._mac_key + + @mac_key.setter + def mac_key(self, mac_key): + """Sets the mac_key of this GenerateAcmeEabOutput. + + + :param mac_key: The mac_key of this GenerateAcmeEabOutput. # noqa: E501 + :type: str + """ + + self._mac_key = mac_key + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, GenerateAcmeEabOutput): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, GenerateAcmeEabOutput): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/get_group_output.py b/akeyless/models/get_group_output.py index 438637b9..9cef10cd 100644 --- a/akeyless/models/get_group_output.py +++ b/akeyless/models/get_group_output.py @@ -40,6 +40,7 @@ class GetGroupOutput(object): 'group_alias': 'str', 'group_id': 'str', 'group_name': 'str', + 'is_subclaims_with_operator': 'bool', 'modification_date': 'datetime', 'user_assignments': 'list[AccessPermissionAssignment]' } @@ -51,11 +52,12 @@ class GetGroupOutput(object): 'group_alias': 'group_alias', 'group_id': 'group_id', 'group_name': 'group_name', + 'is_subclaims_with_operator': 'is_subclaims_with_operator', 'modification_date': 'modification_date', 'user_assignments': 'user_assignments' } - def __init__(self, account_id=None, creation_date=None, description=None, group_alias=None, group_id=None, group_name=None, modification_date=None, user_assignments=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, account_id=None, creation_date=None, description=None, group_alias=None, group_id=None, group_name=None, is_subclaims_with_operator=None, modification_date=None, user_assignments=None, local_vars_configuration=None): # noqa: E501 """GetGroupOutput - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -67,6 +69,7 @@ def __init__(self, account_id=None, creation_date=None, description=None, group_ self._group_alias = None self._group_id = None self._group_name = None + self._is_subclaims_with_operator = None self._modification_date = None self._user_assignments = None self.discriminator = None @@ -83,6 +86,8 @@ def __init__(self, account_id=None, creation_date=None, description=None, group_ self.group_id = group_id if group_name is not None: self.group_name = group_name + if is_subclaims_with_operator is not None: + self.is_subclaims_with_operator = is_subclaims_with_operator if modification_date is not None: self.modification_date = modification_date if user_assignments is not None: @@ -214,6 +219,27 @@ def group_name(self, group_name): self._group_name = group_name + @property + def is_subclaims_with_operator(self): + """Gets the is_subclaims_with_operator of this GetGroupOutput. # noqa: E501 + + + :return: The is_subclaims_with_operator of this GetGroupOutput. # noqa: E501 + :rtype: bool + """ + return self._is_subclaims_with_operator + + @is_subclaims_with_operator.setter + def is_subclaims_with_operator(self, is_subclaims_with_operator): + """Sets the is_subclaims_with_operator of this GetGroupOutput. + + + :param is_subclaims_with_operator: The is_subclaims_with_operator of this GetGroupOutput. # noqa: E501 + :type: bool + """ + + self._is_subclaims_with_operator = is_subclaims_with_operator + @property def modification_date(self): """Gets the modification_date of this GetGroupOutput. # noqa: E501 diff --git a/akeyless/models/get_kube_exec_creds.py b/akeyless/models/get_kube_exec_creds.py index a76670de..531534ae 100644 --- a/akeyless/models/get_kube_exec_creds.py +++ b/akeyless/models/get_kube_exec_creds.py @@ -233,7 +233,7 @@ def csr_data_base64(self, csr_data_base64): def extended_key_usage(self): """Gets the extended_key_usage of this GetKubeExecCreds. # noqa: E501 - A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. # noqa: E501 + A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501 :return: The extended_key_usage of this GetKubeExecCreds. # noqa: E501 :rtype: str @@ -244,7 +244,7 @@ def extended_key_usage(self): def extended_key_usage(self, extended_key_usage): """Sets the extended_key_usage of this GetKubeExecCreds. - A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. # noqa: E501 + A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501 :param extended_key_usage: The extended_key_usage of this GetKubeExecCreds. # noqa: E501 :type: str diff --git a/akeyless/models/get_pki_certificate.py b/akeyless/models/get_pki_certificate.py index 13913e6f..115db07f 100644 --- a/akeyless/models/get_pki_certificate.py +++ b/akeyless/models/get_pki_certificate.py @@ -205,7 +205,7 @@ def csr_data_base64(self, csr_data_base64): def extended_key_usage(self): """Gets the extended_key_usage of this GetPKICertificate. # noqa: E501 - A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. # noqa: E501 + A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501 :return: The extended_key_usage of this GetPKICertificate. # noqa: E501 :rtype: str @@ -216,7 +216,7 @@ def extended_key_usage(self): def extended_key_usage(self, extended_key_usage): """Sets the extended_key_usage of this GetPKICertificate. - A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. # noqa: E501 + A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501 :param extended_key_usage: The extended_key_usage of this GetPKICertificate. # noqa: E501 :type: str diff --git a/akeyless/models/group.py b/akeyless/models/group.py index 5f7dfa22..51a3a565 100644 --- a/akeyless/models/group.py +++ b/akeyless/models/group.py @@ -40,6 +40,7 @@ class Group(object): 'group_alias': 'str', 'group_id': 'str', 'group_name': 'str', + 'is_subclaims_with_operator': 'bool', 'modification_date': 'datetime', 'user_assignments': 'list[AccessPermissionAssignment]' } @@ -51,11 +52,12 @@ class Group(object): 'group_alias': 'group_alias', 'group_id': 'group_id', 'group_name': 'group_name', + 'is_subclaims_with_operator': 'is_subclaims_with_operator', 'modification_date': 'modification_date', 'user_assignments': 'user_assignments' } - def __init__(self, account_id=None, creation_date=None, description=None, group_alias=None, group_id=None, group_name=None, modification_date=None, user_assignments=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, account_id=None, creation_date=None, description=None, group_alias=None, group_id=None, group_name=None, is_subclaims_with_operator=None, modification_date=None, user_assignments=None, local_vars_configuration=None): # noqa: E501 """Group - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -67,6 +69,7 @@ def __init__(self, account_id=None, creation_date=None, description=None, group_ self._group_alias = None self._group_id = None self._group_name = None + self._is_subclaims_with_operator = None self._modification_date = None self._user_assignments = None self.discriminator = None @@ -83,6 +86,8 @@ def __init__(self, account_id=None, creation_date=None, description=None, group_ self.group_id = group_id if group_name is not None: self.group_name = group_name + if is_subclaims_with_operator is not None: + self.is_subclaims_with_operator = is_subclaims_with_operator if modification_date is not None: self.modification_date = modification_date if user_assignments is not None: @@ -214,6 +219,27 @@ def group_name(self, group_name): self._group_name = group_name + @property + def is_subclaims_with_operator(self): + """Gets the is_subclaims_with_operator of this Group. # noqa: E501 + + + :return: The is_subclaims_with_operator of this Group. # noqa: E501 + :rtype: bool + """ + return self._is_subclaims_with_operator + + @is_subclaims_with_operator.setter + def is_subclaims_with_operator(self, is_subclaims_with_operator): + """Sets the is_subclaims_with_operator of this Group. + + + :param is_subclaims_with_operator: The is_subclaims_with_operator of this Group. # noqa: E501 + :type: bool + """ + + self._is_subclaims_with_operator = is_subclaims_with_operator + @property def modification_date(self): """Gets the modification_date of this Group. # noqa: E501 diff --git a/akeyless/models/list_acme_accounts.py b/akeyless/models/list_acme_accounts.py new file mode 100644 index 00000000..cf53b9bf --- /dev/null +++ b/akeyless/models/list_acme_accounts.py @@ -0,0 +1,208 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class ListAcmeAccounts(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'cert_issuer_name': 'str', + 'json': 'bool', + 'token': 'str', + 'uid_token': 'str' + } + + attribute_map = { + 'cert_issuer_name': 'cert-issuer-name', + 'json': 'json', + 'token': 'token', + 'uid_token': 'uid-token' + } + + def __init__(self, cert_issuer_name=None, json=False, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + """ListAcmeAccounts - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._cert_issuer_name = None + self._json = None + self._token = None + self._uid_token = None + self.discriminator = None + + self.cert_issuer_name = cert_issuer_name + if json is not None: + self.json = json + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + + @property + def cert_issuer_name(self): + """Gets the cert_issuer_name of this ListAcmeAccounts. # noqa: E501 + + The name of the PKI certificate issuer # noqa: E501 + + :return: The cert_issuer_name of this ListAcmeAccounts. # noqa: E501 + :rtype: str + """ + return self._cert_issuer_name + + @cert_issuer_name.setter + def cert_issuer_name(self, cert_issuer_name): + """Sets the cert_issuer_name of this ListAcmeAccounts. + + The name of the PKI certificate issuer # noqa: E501 + + :param cert_issuer_name: The cert_issuer_name of this ListAcmeAccounts. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and cert_issuer_name is None: # noqa: E501 + raise ValueError("Invalid value for `cert_issuer_name`, must not be `None`") # noqa: E501 + + self._cert_issuer_name = cert_issuer_name + + @property + def json(self): + """Gets the json of this ListAcmeAccounts. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this ListAcmeAccounts. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this ListAcmeAccounts. + + Set output format to JSON # noqa: E501 + + :param json: The json of this ListAcmeAccounts. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def token(self): + """Gets the token of this ListAcmeAccounts. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this ListAcmeAccounts. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this ListAcmeAccounts. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this ListAcmeAccounts. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this ListAcmeAccounts. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this ListAcmeAccounts. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this ListAcmeAccounts. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this ListAcmeAccounts. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, ListAcmeAccounts): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, ListAcmeAccounts): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/list_acme_accounts_output.py b/akeyless/models/list_acme_accounts_output.py new file mode 100644 index 00000000..a4f25b72 --- /dev/null +++ b/akeyless/models/list_acme_accounts_output.py @@ -0,0 +1,121 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class ListAcmeAccountsOutput(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'accounts': 'list[AcmeAccount]' + } + + attribute_map = { + 'accounts': 'accounts' + } + + def __init__(self, accounts=None, local_vars_configuration=None): # noqa: E501 + """ListAcmeAccountsOutput - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._accounts = None + self.discriminator = None + + if accounts is not None: + self.accounts = accounts + + @property + def accounts(self): + """Gets the accounts of this ListAcmeAccountsOutput. # noqa: E501 + + + :return: The accounts of this ListAcmeAccountsOutput. # noqa: E501 + :rtype: list[AcmeAccount] + """ + return self._accounts + + @accounts.setter + def accounts(self, accounts): + """Sets the accounts of this ListAcmeAccountsOutput. + + + :param accounts: The accounts of this ListAcmeAccountsOutput. # noqa: E501 + :type: list[AcmeAccount] + """ + + self._accounts = accounts + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, ListAcmeAccountsOutput): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, ListAcmeAccountsOutput): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/pki_certificate_issue_details.py b/akeyless/models/pki_certificate_issue_details.py index 511935b0..9e04973b 100644 --- a/akeyless/models/pki_certificate_issue_details.py +++ b/akeyless/models/pki_certificate_issue_details.py @@ -34,6 +34,7 @@ class PKICertificateIssueDetails(object): and the value is json key in definition. """ openapi_types = { + 'acme_enabled': 'bool', 'allow_any_name': 'bool', 'allow_copy_ext_from_csr': 'bool', 'allow_subdomains': 'bool', @@ -57,6 +58,7 @@ class PKICertificateIssueDetails(object): 'key_type': 'str', 'key_usage_list': 'list[str]', 'locality': 'list[str]', + 'non_critical_key_usage': 'bool', 'not_before_duration': 'int', 'organization_list': 'list[str]', 'organization_unit_list': 'list[str]', @@ -69,6 +71,7 @@ class PKICertificateIssueDetails(object): } attribute_map = { + 'acme_enabled': 'acme_enabled', 'allow_any_name': 'allow_any_name', 'allow_copy_ext_from_csr': 'allow_copy_ext_from_csr', 'allow_subdomains': 'allow_subdomains', @@ -92,6 +95,7 @@ class PKICertificateIssueDetails(object): 'key_type': 'key_type', 'key_usage_list': 'key_usage_list', 'locality': 'locality', + 'non_critical_key_usage': 'non_critical_key_usage', 'not_before_duration': 'not_before_duration', 'organization_list': 'organization_list', 'organization_unit_list': 'organization_unit_list', @@ -103,12 +107,13 @@ class PKICertificateIssueDetails(object): 'street_address': 'street_address' } - def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains_list=None, allowed_extra_extensions=None, allowed_uri_sans=None, basic_constraints_valid_for_non_ca=None, certificate_authority_mode=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, destination_path=None, enforce_hostnames=None, expiration_events=None, gw_cluster_id=None, gw_cluster_url=None, is_ca=None, key_bits=None, key_type=None, key_usage_list=None, locality=None, not_before_duration=None, organization_list=None, organization_unit_list=None, postal_code=None, protect_generated_certificates=None, province=None, require_cn=None, server_flag=None, street_address=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains_list=None, allowed_extra_extensions=None, allowed_uri_sans=None, basic_constraints_valid_for_non_ca=None, certificate_authority_mode=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, destination_path=None, enforce_hostnames=None, expiration_events=None, gw_cluster_id=None, gw_cluster_url=None, is_ca=None, key_bits=None, key_type=None, key_usage_list=None, locality=None, non_critical_key_usage=None, not_before_duration=None, organization_list=None, organization_unit_list=None, postal_code=None, protect_generated_certificates=None, province=None, require_cn=None, server_flag=None, street_address=None, local_vars_configuration=None): # noqa: E501 """PKICertificateIssueDetails - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() self.local_vars_configuration = local_vars_configuration + self._acme_enabled = None self._allow_any_name = None self._allow_copy_ext_from_csr = None self._allow_subdomains = None @@ -132,6 +137,7 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self._key_type = None self._key_usage_list = None self._locality = None + self._non_critical_key_usage = None self._not_before_duration = None self._organization_list = None self._organization_unit_list = None @@ -143,6 +149,8 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self._street_address = None self.discriminator = None + if acme_enabled is not None: + self.acme_enabled = acme_enabled if allow_any_name is not None: self.allow_any_name = allow_any_name if allow_copy_ext_from_csr is not None: @@ -189,6 +197,8 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self.key_usage_list = key_usage_list if locality is not None: self.locality = locality + if non_critical_key_usage is not None: + self.non_critical_key_usage = non_critical_key_usage if not_before_duration is not None: self.not_before_duration = not_before_duration if organization_list is not None: @@ -208,6 +218,27 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd if street_address is not None: self.street_address = street_address + @property + def acme_enabled(self): + """Gets the acme_enabled of this PKICertificateIssueDetails. # noqa: E501 + + + :return: The acme_enabled of this PKICertificateIssueDetails. # noqa: E501 + :rtype: bool + """ + return self._acme_enabled + + @acme_enabled.setter + def acme_enabled(self, acme_enabled): + """Sets the acme_enabled of this PKICertificateIssueDetails. + + + :param acme_enabled: The acme_enabled of this PKICertificateIssueDetails. # noqa: E501 + :type: bool + """ + + self._acme_enabled = acme_enabled + @property def allow_any_name(self): """Gets the allow_any_name of this PKICertificateIssueDetails. # noqa: E501 @@ -697,6 +728,27 @@ def locality(self, locality): self._locality = locality + @property + def non_critical_key_usage(self): + """Gets the non_critical_key_usage of this PKICertificateIssueDetails. # noqa: E501 + + + :return: The non_critical_key_usage of this PKICertificateIssueDetails. # noqa: E501 + :rtype: bool + """ + return self._non_critical_key_usage + + @non_critical_key_usage.setter + def non_critical_key_usage(self, non_critical_key_usage): + """Sets the non_critical_key_usage of this PKICertificateIssueDetails. + + + :param non_critical_key_usage: The non_critical_key_usage of this PKICertificateIssueDetails. # noqa: E501 + :type: bool + """ + + self._non_critical_key_usage = non_critical_key_usage + @property def not_before_duration(self): """Gets the not_before_duration of this PKICertificateIssueDetails. # noqa: E501 diff --git a/akeyless/models/role_association_details.py b/akeyless/models/role_association_details.py index a840baba..43395c36 100644 --- a/akeyless/models/role_association_details.py +++ b/akeyless/models/role_association_details.py @@ -37,6 +37,7 @@ class RoleAssociationDetails(object): 'assoc_id': 'str', 'auth_method_name': 'str', 'auth_method_sub_claims': 'dict(str, list[str])', + 'is_subclaims_with_operator': 'bool', 'role_name': 'str', 'sub_claims_case_sensitive': 'bool' } @@ -45,11 +46,12 @@ class RoleAssociationDetails(object): 'assoc_id': 'assoc_id', 'auth_method_name': 'auth_method_name', 'auth_method_sub_claims': 'auth_method_sub_claims', + 'is_subclaims_with_operator': 'is_subclaims_with_operator', 'role_name': 'role_name', 'sub_claims_case_sensitive': 'sub_claims_case_sensitive' } - def __init__(self, assoc_id=None, auth_method_name=None, auth_method_sub_claims=None, role_name=None, sub_claims_case_sensitive=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, assoc_id=None, auth_method_name=None, auth_method_sub_claims=None, is_subclaims_with_operator=None, role_name=None, sub_claims_case_sensitive=None, local_vars_configuration=None): # noqa: E501 """RoleAssociationDetails - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -58,6 +60,7 @@ def __init__(self, assoc_id=None, auth_method_name=None, auth_method_sub_claims= self._assoc_id = None self._auth_method_name = None self._auth_method_sub_claims = None + self._is_subclaims_with_operator = None self._role_name = None self._sub_claims_case_sensitive = None self.discriminator = None @@ -68,6 +71,8 @@ def __init__(self, assoc_id=None, auth_method_name=None, auth_method_sub_claims= self.auth_method_name = auth_method_name if auth_method_sub_claims is not None: self.auth_method_sub_claims = auth_method_sub_claims + if is_subclaims_with_operator is not None: + self.is_subclaims_with_operator = is_subclaims_with_operator if role_name is not None: self.role_name = role_name if sub_claims_case_sensitive is not None: @@ -136,6 +141,27 @@ def auth_method_sub_claims(self, auth_method_sub_claims): self._auth_method_sub_claims = auth_method_sub_claims + @property + def is_subclaims_with_operator(self): + """Gets the is_subclaims_with_operator of this RoleAssociationDetails. # noqa: E501 + + + :return: The is_subclaims_with_operator of this RoleAssociationDetails. # noqa: E501 + :rtype: bool + """ + return self._is_subclaims_with_operator + + @is_subclaims_with_operator.setter + def is_subclaims_with_operator(self, is_subclaims_with_operator): + """Sets the is_subclaims_with_operator of this RoleAssociationDetails. + + + :param is_subclaims_with_operator: The is_subclaims_with_operator of this RoleAssociationDetails. # noqa: E501 + :type: bool + """ + + self._is_subclaims_with_operator = is_subclaims_with_operator + @property def role_name(self): """Gets the role_name of this RoleAssociationDetails. # noqa: E501 diff --git a/akeyless/models/role_auth_method_association.py b/akeyless/models/role_auth_method_association.py index add2ba9e..189016c2 100644 --- a/akeyless/models/role_auth_method_association.py +++ b/akeyless/models/role_auth_method_association.py @@ -38,6 +38,7 @@ class RoleAuthMethodAssociation(object): 'auth_method_access_id': 'str', 'auth_method_name': 'str', 'auth_method_sub_claims': 'dict(str, list[str])', + 'is_subclaims_with_operator': 'bool', 'sub_claims_case_sensitive': 'bool' } @@ -46,10 +47,11 @@ class RoleAuthMethodAssociation(object): 'auth_method_access_id': 'auth_method_access_id', 'auth_method_name': 'auth_method_name', 'auth_method_sub_claims': 'auth_method_sub_claims', + 'is_subclaims_with_operator': 'is_subclaims_with_operator', 'sub_claims_case_sensitive': 'sub_claims_case_sensitive' } - def __init__(self, assoc_id=None, auth_method_access_id=None, auth_method_name=None, auth_method_sub_claims=None, sub_claims_case_sensitive=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, assoc_id=None, auth_method_access_id=None, auth_method_name=None, auth_method_sub_claims=None, is_subclaims_with_operator=None, sub_claims_case_sensitive=None, local_vars_configuration=None): # noqa: E501 """RoleAuthMethodAssociation - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -59,6 +61,7 @@ def __init__(self, assoc_id=None, auth_method_access_id=None, auth_method_name=N self._auth_method_access_id = None self._auth_method_name = None self._auth_method_sub_claims = None + self._is_subclaims_with_operator = None self._sub_claims_case_sensitive = None self.discriminator = None @@ -70,6 +73,8 @@ def __init__(self, assoc_id=None, auth_method_access_id=None, auth_method_name=N self.auth_method_name = auth_method_name if auth_method_sub_claims is not None: self.auth_method_sub_claims = auth_method_sub_claims + if is_subclaims_with_operator is not None: + self.is_subclaims_with_operator = is_subclaims_with_operator if sub_claims_case_sensitive is not None: self.sub_claims_case_sensitive = sub_claims_case_sensitive @@ -157,6 +162,27 @@ def auth_method_sub_claims(self, auth_method_sub_claims): self._auth_method_sub_claims = auth_method_sub_claims + @property + def is_subclaims_with_operator(self): + """Gets the is_subclaims_with_operator of this RoleAuthMethodAssociation. # noqa: E501 + + + :return: The is_subclaims_with_operator of this RoleAuthMethodAssociation. # noqa: E501 + :rtype: bool + """ + return self._is_subclaims_with_operator + + @is_subclaims_with_operator.setter + def is_subclaims_with_operator(self, is_subclaims_with_operator): + """Sets the is_subclaims_with_operator of this RoleAuthMethodAssociation. + + + :param is_subclaims_with_operator: The is_subclaims_with_operator of this RoleAuthMethodAssociation. # noqa: E501 + :type: bool + """ + + self._is_subclaims_with_operator = is_subclaims_with_operator + @property def sub_claims_case_sensitive(self): """Gets the sub_claims_case_sensitive of this RoleAuthMethodAssociation. # noqa: E501 diff --git a/akeyless/models/update_classic_key_certificate.py b/akeyless/models/update_classic_key_certificate.py index fed89f87..1474e0d5 100644 --- a/akeyless/models/update_classic_key_certificate.py +++ b/akeyless/models/update_classic_key_certificate.py @@ -35,6 +35,7 @@ class UpdateClassicKeyCertificate(object): """ openapi_types = { 'cert_file_data': 'str', + 'certificate_format': 'str', 'json': 'bool', 'name': 'str', 'token': 'str', @@ -43,19 +44,21 @@ class UpdateClassicKeyCertificate(object): attribute_map = { 'cert_file_data': 'cert-file-data', + 'certificate_format': 'certificate-format', 'json': 'json', 'name': 'name', 'token': 'token', 'uid_token': 'uid-token' } - def __init__(self, cert_file_data=None, json=False, name=None, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, cert_file_data=None, certificate_format=None, json=False, name=None, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 """UpdateClassicKeyCertificate - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() self.local_vars_configuration = local_vars_configuration self._cert_file_data = None + self._certificate_format = None self._json = None self._name = None self._token = None @@ -64,6 +67,8 @@ def __init__(self, cert_file_data=None, json=False, name=None, token=None, uid_t if cert_file_data is not None: self.cert_file_data = cert_file_data + if certificate_format is not None: + self.certificate_format = certificate_format if json is not None: self.json = json self.name = name @@ -95,6 +100,27 @@ def cert_file_data(self, cert_file_data): self._cert_file_data = cert_file_data + @property + def certificate_format(self): + """Gets the certificate_format of this UpdateClassicKeyCertificate. # noqa: E501 + + + :return: The certificate_format of this UpdateClassicKeyCertificate. # noqa: E501 + :rtype: str + """ + return self._certificate_format + + @certificate_format.setter + def certificate_format(self, certificate_format): + """Sets the certificate_format of this UpdateClassicKeyCertificate. + + + :param certificate_format: The certificate_format of this UpdateClassicKeyCertificate. # noqa: E501 + :type: str + """ + + self._certificate_format = certificate_format + @property def json(self): """Gets the json of this UpdateClassicKeyCertificate. # noqa: E501 diff --git a/akeyless/models/update_item.py b/akeyless/models/update_item.py index e0e5bfed..3b9464e8 100644 --- a/akeyless/models/update_item.py +++ b/akeyless/models/update_item.py @@ -38,6 +38,7 @@ class UpdateItem(object): 'accessibility': 'str', 'add_tag': 'list[str]', 'cert_file_data': 'str', + 'certificate_format': 'str', 'change_event': 'str', 'delete_protection': 'str', 'description': 'str', @@ -84,6 +85,7 @@ class UpdateItem(object): 'accessibility': 'accessibility', 'add_tag': 'add-tag', 'cert_file_data': 'cert-file-data', + 'certificate_format': 'certificate-format', 'change_event': 'change-event', 'delete_protection': 'delete_protection', 'description': 'description', @@ -125,7 +127,7 @@ class UpdateItem(object): 'uid_token': 'uid-token' } - def __init__(self, provider_type=None, accessibility='regular', add_tag=None, cert_file_data=None, change_event=None, delete_protection=None, description='default_metadata', expiration_event_in=None, host_provider=None, json=False, max_versions=None, name=None, new_metadata='default_metadata', new_name=None, rm_tag=None, rotate_after_disconnect='false', secure_access_add_host=None, secure_access_allow_external_user=None, secure_access_allow_port_forwading=None, secure_access_aws_account_id=None, secure_access_aws_native_cli=None, secure_access_aws_region=None, secure_access_bastion_api=None, secure_access_bastion_issuer=None, secure_access_bastion_ssh=None, secure_access_cluster_endpoint=None, secure_access_dashboard_url=None, secure_access_db_name=None, secure_access_db_schema=None, secure_access_enable=None, secure_access_host=None, secure_access_rd_gateway_server=None, secure_access_rdp_domain=None, secure_access_rdp_user=None, secure_access_rm_host=None, secure_access_ssh_creds=None, secure_access_ssh_creds_user=None, secure_access_url=None, secure_access_use_internal_bastion=None, secure_access_web_browsing=False, secure_access_web_proxy=False, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, provider_type=None, accessibility='regular', add_tag=None, cert_file_data=None, certificate_format=None, change_event=None, delete_protection=None, description='default_metadata', expiration_event_in=None, host_provider=None, json=False, max_versions=None, name=None, new_metadata='default_metadata', new_name=None, rm_tag=None, rotate_after_disconnect='false', secure_access_add_host=None, secure_access_allow_external_user=None, secure_access_allow_port_forwading=None, secure_access_aws_account_id=None, secure_access_aws_native_cli=None, secure_access_aws_region=None, secure_access_bastion_api=None, secure_access_bastion_issuer=None, secure_access_bastion_ssh=None, secure_access_cluster_endpoint=None, secure_access_dashboard_url=None, secure_access_db_name=None, secure_access_db_schema=None, secure_access_enable=None, secure_access_host=None, secure_access_rd_gateway_server=None, secure_access_rdp_domain=None, secure_access_rdp_user=None, secure_access_rm_host=None, secure_access_ssh_creds=None, secure_access_ssh_creds_user=None, secure_access_url=None, secure_access_use_internal_bastion=None, secure_access_web_browsing=False, secure_access_web_proxy=False, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 """UpdateItem - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -135,6 +137,7 @@ def __init__(self, provider_type=None, accessibility='regular', add_tag=None, ce self._accessibility = None self._add_tag = None self._cert_file_data = None + self._certificate_format = None self._change_event = None self._delete_protection = None self._description = None @@ -184,6 +187,8 @@ def __init__(self, provider_type=None, accessibility='regular', add_tag=None, ce self.add_tag = add_tag if cert_file_data is not None: self.cert_file_data = cert_file_data + if certificate_format is not None: + self.certificate_format = certificate_format if change_event is not None: self.change_event = change_event if delete_protection is not None: @@ -352,6 +357,27 @@ def cert_file_data(self, cert_file_data): self._cert_file_data = cert_file_data + @property + def certificate_format(self): + """Gets the certificate_format of this UpdateItem. # noqa: E501 + + + :return: The certificate_format of this UpdateItem. # noqa: E501 + :rtype: str + """ + return self._certificate_format + + @certificate_format.setter + def certificate_format(self, certificate_format): + """Sets the certificate_format of this UpdateItem. + + + :param certificate_format: The certificate_format of this UpdateItem. # noqa: E501 + :type: str + """ + + self._certificate_format = certificate_format + @property def change_event(self): """Gets the change_event of this UpdateItem. # noqa: E501 diff --git a/akeyless/models/update_pki_cert_issuer.py b/akeyless/models/update_pki_cert_issuer.py index 66fb4a4f..0a89999e 100644 --- a/akeyless/models/update_pki_cert_issuer.py +++ b/akeyless/models/update_pki_cert_issuer.py @@ -46,9 +46,11 @@ class UpdatePKICertIssuer(object): 'country': 'str', 'create_private_crl': 'bool', 'create_public_crl': 'bool', + 'critical_key_usage': 'str', 'delete_protection': 'str', 'description': 'str', 'destination_path': 'str', + 'enable_acme': 'bool', 'expiration_event_in': 'list[str]', 'gw_cluster_url': 'str', 'is_ca': 'bool', @@ -87,9 +89,11 @@ class UpdatePKICertIssuer(object): 'country': 'country', 'create_private_crl': 'create-private-crl', 'create_public_crl': 'create-public-crl', + 'critical_key_usage': 'critical-key-usage', 'delete_protection': 'delete_protection', 'description': 'description', 'destination_path': 'destination-path', + 'enable_acme': 'enable-acme', 'expiration_event_in': 'expiration-event-in', 'gw_cluster_url': 'gw-cluster-url', 'is_ca': 'is-ca', @@ -115,7 +119,7 @@ class UpdatePKICertIssuer(object): 'uid_token': 'uid-token' } - def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, delete_protection=None, description=None, destination_path=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, new_name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, rm_tag=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, critical_key_usage='true', delete_protection=None, description=None, destination_path=None, enable_acme=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, new_name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, rm_tag=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 """UpdatePKICertIssuer - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -133,9 +137,11 @@ def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=No self._country = None self._create_private_crl = None self._create_public_crl = None + self._critical_key_usage = None self._delete_protection = None self._description = None self._destination_path = None + self._enable_acme = None self._expiration_event_in = None self._gw_cluster_url = None self._is_ca = None @@ -185,12 +191,16 @@ def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=No self.create_private_crl = create_private_crl if create_public_crl is not None: self.create_public_crl = create_public_crl + if critical_key_usage is not None: + self.critical_key_usage = critical_key_usage if delete_protection is not None: self.delete_protection = delete_protection if description is not None: self.description = description if destination_path is not None: self.destination_path = destination_path + if enable_acme is not None: + self.enable_acme = enable_acme if expiration_event_in is not None: self.expiration_event_in = expiration_event_in if gw_cluster_url is not None: @@ -511,6 +521,29 @@ def create_public_crl(self, create_public_crl): self._create_public_crl = create_public_crl + @property + def critical_key_usage(self): + """Gets the critical_key_usage of this UpdatePKICertIssuer. # noqa: E501 + + Mark key usage as critical [true/false] # noqa: E501 + + :return: The critical_key_usage of this UpdatePKICertIssuer. # noqa: E501 + :rtype: str + """ + return self._critical_key_usage + + @critical_key_usage.setter + def critical_key_usage(self, critical_key_usage): + """Sets the critical_key_usage of this UpdatePKICertIssuer. + + Mark key usage as critical [true/false] # noqa: E501 + + :param critical_key_usage: The critical_key_usage of this UpdatePKICertIssuer. # noqa: E501 + :type: str + """ + + self._critical_key_usage = critical_key_usage + @property def delete_protection(self): """Gets the delete_protection of this UpdatePKICertIssuer. # noqa: E501 @@ -580,6 +613,29 @@ def destination_path(self, destination_path): self._destination_path = destination_path + @property + def enable_acme(self): + """Gets the enable_acme of this UpdatePKICertIssuer. # noqa: E501 + + If set, the cert issuer will support the acme protocol # noqa: E501 + + :return: The enable_acme of this UpdatePKICertIssuer. # noqa: E501 + :rtype: bool + """ + return self._enable_acme + + @enable_acme.setter + def enable_acme(self, enable_acme): + """Sets the enable_acme of this UpdatePKICertIssuer. + + If set, the cert issuer will support the acme protocol # noqa: E501 + + :param enable_acme: The enable_acme of this UpdatePKICertIssuer. # noqa: E501 + :type: bool + """ + + self._enable_acme = enable_acme + @property def expiration_event_in(self): """Gets the expiration_event_in of this UpdatePKICertIssuer. # noqa: E501 @@ -607,7 +663,7 @@ def expiration_event_in(self, expiration_event_in): def gw_cluster_url(self): """Gets the gw_cluster_url of this UpdatePKICertIssuer. # noqa: E501 - The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA # noqa: E501 + The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME # noqa: E501 :return: The gw_cluster_url of this UpdatePKICertIssuer. # noqa: E501 :rtype: str @@ -618,7 +674,7 @@ def gw_cluster_url(self): def gw_cluster_url(self, gw_cluster_url): """Sets the gw_cluster_url of this UpdatePKICertIssuer. - The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA # noqa: E501 + The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME # noqa: E501 :param gw_cluster_url: The gw_cluster_url of this UpdatePKICertIssuer. # noqa: E501 :type: str diff --git a/docs/AcmeAccount.md b/docs/AcmeAccount.md new file mode 100644 index 00000000..73bc2a3d --- /dev/null +++ b/docs/AcmeAccount.md @@ -0,0 +1,13 @@ +# AcmeAccount + +AcmeAccount is copied without the jwk as it seems like it has issues with sdk +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**account_id** | **str** | AccountId is the ACME account id, not Akeyless account id | [optional] +**key_digest** | **str** | | [optional] +**status** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AuthMethodRoleAssociation.md b/docs/AuthMethodRoleAssociation.md index 530205a3..23beaa87 100644 --- a/docs/AuthMethodRoleAssociation.md +++ b/docs/AuthMethodRoleAssociation.md @@ -8,6 +8,7 @@ Name | Type | Description | Notes **assoc_id** | **str** | | [optional] **auth_method_sub_claims** | **dict(str, list[str])** | | [optional] **is_sub_claims_case_sensitive** | **bool** | | [optional] +**is_subclaims_with_operator** | **bool** | | [optional] **role_name** | **str** | | [optional] **rules** | [**Rules**](Rules.md) | | [optional] diff --git a/docs/ChangeAdminAccountPassword.md b/docs/ChangeAdminAccountPassword.md new file mode 100644 index 00000000..4f2cf2ad --- /dev/null +++ b/docs/ChangeAdminAccountPassword.md @@ -0,0 +1,14 @@ +# ChangeAdminAccountPassword + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**current_password** | **str** | Current password | +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**new_password** | **str** | New password | +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/CreatePKICertIssuer.md b/docs/CreatePKICertIssuer.md index 0d61648a..d217f980 100644 --- a/docs/CreatePKICertIssuer.md +++ b/docs/CreatePKICertIssuer.md @@ -15,11 +15,13 @@ Name | Type | Description | Notes **country** | **str** | A comma-separated list of countries that will be set in the issued certificate | [optional] **create_private_crl** | **bool** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] **create_public_crl** | **bool** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] +**critical_key_usage** | **str** | Mark key usage as critical [true/false] | [optional] [default to 'true'] **delete_protection** | **str** | Protection from accidental deletion of this object [true/false] | [optional] **description** | **str** | Description of the object | [optional] **destination_path** | **str** | A path in which to save generated certificates | [optional] +**enable_acme** | **bool** | If set, the cert issuer will support the acme protocol | [optional] **expiration_event_in** | **list[str]** | How many days before the expiration of the certificate would you like to be notified. | [optional] -**gw_cluster_url** | **str** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] +**gw_cluster_url** | **str** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] **is_ca** | **bool** | If set, the basic constraints extension will be added to certificate | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] **key_usage** | **str** | key-usage | [optional] [default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] diff --git a/docs/DeactivateAcmeAccount.md b/docs/DeactivateAcmeAccount.md new file mode 100644 index 00000000..fb98f197 --- /dev/null +++ b/docs/DeactivateAcmeAccount.md @@ -0,0 +1,16 @@ +# DeactivateAcmeAccount + +deactivateAcmeAccount is a command that Deactivates \\ Deletes an acme external account +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**acme_account_id** | **str** | The acme account id to deactivate | +**cert_issuer_name** | **str** | The name of the PKI certificate issuer | +**delete_account** | **bool** | Delete the account | [optional] +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/GenerateAcmeEab.md b/docs/GenerateAcmeEab.md new file mode 100644 index 00000000..8bb890df --- /dev/null +++ b/docs/GenerateAcmeEab.md @@ -0,0 +1,13 @@ +# GenerateAcmeEab + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cert_issuer_name** | **str** | The name of the PKI certificate issuer | +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/GenerateAcmeEabOutput.md b/docs/GenerateAcmeEabOutput.md new file mode 100644 index 00000000..11d10dd5 --- /dev/null +++ b/docs/GenerateAcmeEabOutput.md @@ -0,0 +1,12 @@ +# GenerateAcmeEabOutput + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**expires_at** | **datetime** | | [optional] +**kid** | **str** | | [optional] +**mac_key** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/GetGroupOutput.md b/docs/GetGroupOutput.md index e26a1727..62663c0c 100644 --- a/docs/GetGroupOutput.md +++ b/docs/GetGroupOutput.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **group_alias** | **str** | | [optional] **group_id** | **str** | | [optional] **group_name** | **str** | | [optional] +**is_subclaims_with_operator** | **bool** | | [optional] **modification_date** | **datetime** | | [optional] **user_assignments** | [**list[AccessPermissionAssignment]**](AccessPermissionAssignment.md) | | [optional] diff --git a/docs/GetKubeExecCreds.md b/docs/GetKubeExecCreds.md index ece60bd6..ed7617f2 100644 --- a/docs/GetKubeExecCreds.md +++ b/docs/GetKubeExecCreds.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **cert_issuer_name** | **str** | The name of the PKI certificate issuer | **common_name** | **str** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] **csr_data_base64** | **str** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] -**extended_key_usage** | **str** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] +**extended_key_usage** | **str** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] **extra_extensions** | **str** | A json string that defines the requested extra extensions for the certificate | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] **key_data_base64** | **str** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] diff --git a/docs/GetPKICertificate.md b/docs/GetPKICertificate.md index 74ad99e7..894b39cc 100644 --- a/docs/GetPKICertificate.md +++ b/docs/GetPKICertificate.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes **cert_issuer_name** | **str** | The name of the PKI certificate issuer | **common_name** | **str** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] **csr_data_base64** | **str** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] -**extended_key_usage** | **str** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] +**extended_key_usage** | **str** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] **extra_extensions** | **str** | A json string that defines the requested extra extensions for the certificate | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] **key_data_base64** | **str** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] diff --git a/docs/Group.md b/docs/Group.md index 02bc90b1..af9dfb20 100644 --- a/docs/Group.md +++ b/docs/Group.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **group_alias** | **str** | | [optional] **group_id** | **str** | | [optional] **group_name** | **str** | | [optional] +**is_subclaims_with_operator** | **bool** | | [optional] **modification_date** | **datetime** | | [optional] **user_assignments** | [**list[AccessPermissionAssignment]**](AccessPermissionAssignment.md) | | [optional] diff --git a/docs/ListAcmeAccounts.md b/docs/ListAcmeAccounts.md new file mode 100644 index 00000000..da3e353f --- /dev/null +++ b/docs/ListAcmeAccounts.md @@ -0,0 +1,14 @@ +# ListAcmeAccounts + +listAcmeAccounts is a command lists acme external accounts for a cert issuer +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cert_issuer_name** | **str** | The name of the PKI certificate issuer | +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ListAcmeAccountsOutput.md b/docs/ListAcmeAccountsOutput.md new file mode 100644 index 00000000..bcd0ff06 --- /dev/null +++ b/docs/ListAcmeAccountsOutput.md @@ -0,0 +1,10 @@ +# ListAcmeAccountsOutput + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**accounts** | [**list[AcmeAccount]**](AcmeAccount.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKICertificateIssueDetails.md b/docs/PKICertificateIssueDetails.md index 3ddc3de3..59bc4df6 100644 --- a/docs/PKICertificateIssueDetails.md +++ b/docs/PKICertificateIssueDetails.md @@ -3,6 +3,7 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**acme_enabled** | **bool** | | [optional] **allow_any_name** | **bool** | | [optional] **allow_copy_ext_from_csr** | **bool** | | [optional] **allow_subdomains** | **bool** | | [optional] @@ -26,6 +27,7 @@ Name | Type | Description | Notes **key_type** | **str** | | [optional] **key_usage_list** | **list[str]** | | [optional] **locality** | **list[str]** | | [optional] +**non_critical_key_usage** | **bool** | | [optional] **not_before_duration** | **int** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] **organization_list** | **list[str]** | | [optional] **organization_unit_list** | **list[str]** | | [optional] diff --git a/docs/RoleAssociationDetails.md b/docs/RoleAssociationDetails.md index 799d9fc9..261419e8 100644 --- a/docs/RoleAssociationDetails.md +++ b/docs/RoleAssociationDetails.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes **assoc_id** | **str** | | [optional] **auth_method_name** | **str** | | [optional] **auth_method_sub_claims** | **dict(str, list[str])** | | [optional] +**is_subclaims_with_operator** | **bool** | | [optional] **role_name** | **str** | | [optional] **sub_claims_case_sensitive** | **bool** | | [optional] diff --git a/docs/RoleAuthMethodAssociation.md b/docs/RoleAuthMethodAssociation.md index 2dd4a11a..5d875b44 100644 --- a/docs/RoleAuthMethodAssociation.md +++ b/docs/RoleAuthMethodAssociation.md @@ -8,6 +8,7 @@ Name | Type | Description | Notes **auth_method_access_id** | **str** | | [optional] **auth_method_name** | **str** | | [optional] **auth_method_sub_claims** | **dict(str, list[str])** | | [optional] +**is_subclaims_with_operator** | **bool** | | [optional] **sub_claims_case_sensitive** | **bool** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/UpdateClassicKeyCertificate.md b/docs/UpdateClassicKeyCertificate.md index 94c9c9b4..689906ed 100644 --- a/docs/UpdateClassicKeyCertificate.md +++ b/docs/UpdateClassicKeyCertificate.md @@ -5,6 +5,7 @@ UpdateClassicKeyCertificate is a command that updates the certificate for a clas Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cert_file_data** | **str** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**certificate_format** | **str** | | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] **name** | **str** | ClassicKey name | **token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] diff --git a/docs/UpdateItem.md b/docs/UpdateItem.md index 2150ad24..a18213de 100644 --- a/docs/UpdateItem.md +++ b/docs/UpdateItem.md @@ -7,6 +7,7 @@ Name | Type | Description | Notes **accessibility** | **str** | for personal password manager | [optional] [default to 'regular'] **add_tag** | **list[str]** | List of the new tags that will be attached to this item | [optional] **cert_file_data** | **str** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] +**certificate_format** | **str** | | [optional] **change_event** | **str** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] **delete_protection** | **str** | Protection from accidental deletion of this object [true/false] | [optional] **description** | **str** | Description of the object | [optional] [default to 'default_metadata'] diff --git a/docs/UpdatePKICertIssuer.md b/docs/UpdatePKICertIssuer.md index bf795c5e..ee06aa75 100644 --- a/docs/UpdatePKICertIssuer.md +++ b/docs/UpdatePKICertIssuer.md @@ -15,11 +15,13 @@ Name | Type | Description | Notes **country** | **str** | A comma-separated list of countries that will be set in the issued certificate | [optional] **create_private_crl** | **bool** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] **create_public_crl** | **bool** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] +**critical_key_usage** | **str** | Mark key usage as critical [true/false] | [optional] [default to 'true'] **delete_protection** | **str** | Protection from accidental deletion of this object [true/false] | [optional] **description** | **str** | Description of the object | [optional] **destination_path** | **str** | A path in which to save generated certificates | [optional] +**enable_acme** | **bool** | If set, the cert issuer will support the acme protocol | [optional] **expiration_event_in** | **list[str]** | How many days before the expiration of the certificate would you like to be notified. | [optional] -**gw_cluster_url** | **str** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] +**gw_cluster_url** | **str** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] **is_ca** | **bool** | If set, the basic constraints extension will be added to certificate | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] **key_usage** | **str** | key-usage | [optional] [default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] diff --git a/docs/V2Api.md b/docs/V2Api.md index d0a5c88b..cbf2b59a 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -37,6 +37,7 @@ Method | HTTP request | Description [**auth_method_update_oidc**](V2Api.md#auth_method_update_oidc) | **POST** /auth-method-update-oidc | [**auth_method_update_saml**](V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml | [**auth_method_update_universal_identity**](V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity | +[**change_admin_account_password**](V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password | [**configure**](V2Api.md#configure) | **POST** /configure | [**connect**](V2Api.md#connect) | **POST** /connect | [**create_artifactory_target**](V2Api.md#create_artifactory_target) | **POST** /create-artifactory-target | @@ -94,6 +95,7 @@ Method | HTTP request | Description [**create_windows_target**](V2Api.md#create_windows_target) | **POST** /create-windows-target | [**create_zero_ssl_target**](V2Api.md#create_zero_ssl_target) | **POST** /create-zerossl-target | [**createldap_target**](V2Api.md#createldap_target) | **POST** /create-ldap-target | +[**deactivate_acme_account**](V2Api.md#deactivate_acme_account) | **POST** /deactivate-acme-account | [**decrypt**](V2Api.md#decrypt) | **POST** /decrypt | [**decrypt_batch**](V2Api.md#decrypt_batch) | **POST** /decrypt-batch | [**decrypt_gpg**](V2Api.md#decrypt_gpg) | **POST** /decrypt-gpg | @@ -306,6 +308,7 @@ Method | HTTP request | Description [**gateway_update_remote_access_rdp_recordings**](V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording | [**gateway_update_tls_cert**](V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert | [**gateway_update_tmp_users**](V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds | +[**generate_acme_eab**](V2Api.md#generate_acme_eab) | **POST** /generate-acme-eab | [**generate_csr**](V2Api.md#generate_csr) | **POST** /generate-csr | [**get_account_logo**](V2Api.md#get_account_logo) | **POST** /get-account-logo | [**get_account_settings**](V2Api.md#get_account_settings) | **POST** /get-account-settings | @@ -352,6 +355,7 @@ Method | HTTP request | Description [**kmip_renew_server_certificate**](V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment | [**kmip_server_setup**](V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment | [**kmip_set_server_state**](V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state | +[**list_acme_accounts**](V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts | [**list_auth_methods**](V2Api.md#list_auth_methods) | **POST** /list-auth-methods | [**list_gateways**](V2Api.md#list_gateways) | **POST** /list-gateways | [**list_groups**](V2Api.md#list_groups) | **POST** /list-group | @@ -2539,6 +2543,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **change_admin_account_password** +> object change_admin_account_password(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.ChangeAdminAccountPassword() # ChangeAdminAccountPassword | + + try: + api_response = api_instance.change_admin_account_password(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->change_admin_account_password: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ChangeAdminAccountPassword**](ChangeAdminAccountPassword.md)| | + +### Return type + +**object** + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | changeAdminAccountPasswordResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **configure** > ConfigureOutput configure(body) @@ -5959,6 +6023,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **deactivate_acme_account** +> object deactivate_acme_account(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.DeactivateAcmeAccount() # DeactivateAcmeAccount | + + try: + api_response = api_instance.deactivate_acme_account(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->deactivate_acme_account: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**DeactivateAcmeAccount**](DeactivateAcmeAccount.md)| | + +### Return type + +**object** + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | deactivateAcmeAccountResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **decrypt** > DecryptOutput decrypt(body) @@ -18672,6 +18796,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **generate_acme_eab** +> GenerateAcmeEabOutput generate_acme_eab(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.GenerateAcmeEab() # GenerateAcmeEab | + + try: + api_response = api_instance.generate_acme_eab(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->generate_acme_eab: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**GenerateAcmeEab**](GenerateAcmeEab.md)| | + +### Return type + +[**GenerateAcmeEabOutput**](GenerateAcmeEabOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | generateAcmeEabResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **generate_csr** > GenerateCsrOutput generate_csr(body) @@ -21428,6 +21612,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **list_acme_accounts** +> ListAcmeAccountsOutput list_acme_accounts(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.ListAcmeAccounts() # ListAcmeAccounts | + + try: + api_response = api_instance.list_acme_accounts(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->list_acme_accounts: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ListAcmeAccounts**](ListAcmeAccounts.md)| | + +### Return type + +[**ListAcmeAccountsOutput**](ListAcmeAccountsOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | listAcmeAccountsResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **list_auth_methods** > ListAuthMethodsOutput list_auth_methods(body) diff --git a/setup.py b/setup.py index fd3afe33..a103c9af 100644 --- a/setup.py +++ b/setup.py @@ -14,7 +14,7 @@ from setuptools import setup, find_packages # noqa: H301 NAME = "akeyless" -VERSION = "4.2.4" +VERSION = "4.2.5" # To install the library, run the following # # python setup.py install diff --git a/test/test_acme_account.py b/test/test_acme_account.py new file mode 100644 index 00000000..94f481a3 --- /dev/null +++ b/test/test_acme_account.py @@ -0,0 +1,55 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.acme_account import AcmeAccount # noqa: E501 +from akeyless.rest import ApiException + +class TestAcmeAccount(unittest.TestCase): + """AcmeAccount unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test AcmeAccount + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.acme_account.AcmeAccount() # noqa: E501 + if include_optional : + return AcmeAccount( + account_id = '0', + key_digest = '0', + status = '0' + ) + else : + return AcmeAccount( + ) + + def testAcmeAccount(self): + """Test AcmeAccount""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_change_admin_account_password.py b/test/test_change_admin_account_password.py new file mode 100644 index 00000000..84bf12b8 --- /dev/null +++ b/test/test_change_admin_account_password.py @@ -0,0 +1,59 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.change_admin_account_password import ChangeAdminAccountPassword # noqa: E501 +from akeyless.rest import ApiException + +class TestChangeAdminAccountPassword(unittest.TestCase): + """ChangeAdminAccountPassword unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ChangeAdminAccountPassword + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.change_admin_account_password.ChangeAdminAccountPassword() # noqa: E501 + if include_optional : + return ChangeAdminAccountPassword( + current_password = '0', + json = True, + new_password = '0', + token = '0', + uid_token = '0' + ) + else : + return ChangeAdminAccountPassword( + current_password = '0', + new_password = '0', + ) + + def testChangeAdminAccountPassword(self): + """Test ChangeAdminAccountPassword""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_deactivate_acme_account.py b/test/test_deactivate_acme_account.py new file mode 100644 index 00000000..a732a5c3 --- /dev/null +++ b/test/test_deactivate_acme_account.py @@ -0,0 +1,60 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.deactivate_acme_account import DeactivateAcmeAccount # noqa: E501 +from akeyless.rest import ApiException + +class TestDeactivateAcmeAccount(unittest.TestCase): + """DeactivateAcmeAccount unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test DeactivateAcmeAccount + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.deactivate_acme_account.DeactivateAcmeAccount() # noqa: E501 + if include_optional : + return DeactivateAcmeAccount( + acme_account_id = '0', + cert_issuer_name = '0', + delete_account = True, + json = True, + token = '0', + uid_token = '0' + ) + else : + return DeactivateAcmeAccount( + acme_account_id = '0', + cert_issuer_name = '0', + ) + + def testDeactivateAcmeAccount(self): + """Test DeactivateAcmeAccount""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_generate_acme_eab.py b/test/test_generate_acme_eab.py new file mode 100644 index 00000000..eea9120f --- /dev/null +++ b/test/test_generate_acme_eab.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.generate_acme_eab import GenerateAcmeEab # noqa: E501 +from akeyless.rest import ApiException + +class TestGenerateAcmeEab(unittest.TestCase): + """GenerateAcmeEab unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test GenerateAcmeEab + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.generate_acme_eab.GenerateAcmeEab() # noqa: E501 + if include_optional : + return GenerateAcmeEab( + cert_issuer_name = '0', + json = True, + token = '0', + uid_token = '0' + ) + else : + return GenerateAcmeEab( + cert_issuer_name = '0', + ) + + def testGenerateAcmeEab(self): + """Test GenerateAcmeEab""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_generate_acme_eab_output.py b/test/test_generate_acme_eab_output.py new file mode 100644 index 00000000..752cb303 --- /dev/null +++ b/test/test_generate_acme_eab_output.py @@ -0,0 +1,55 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.generate_acme_eab_output import GenerateAcmeEabOutput # noqa: E501 +from akeyless.rest import ApiException + +class TestGenerateAcmeEabOutput(unittest.TestCase): + """GenerateAcmeEabOutput unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test GenerateAcmeEabOutput + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.generate_acme_eab_output.GenerateAcmeEabOutput() # noqa: E501 + if include_optional : + return GenerateAcmeEabOutput( + expires_at = datetime.datetime.strptime('2013-10-20 19:20:30.00', '%Y-%m-%d %H:%M:%S.%f'), + kid = '0', + mac_key = '0' + ) + else : + return GenerateAcmeEabOutput( + ) + + def testGenerateAcmeEabOutput(self): + """Test GenerateAcmeEabOutput""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_list_acme_accounts.py b/test/test_list_acme_accounts.py new file mode 100644 index 00000000..35a2130d --- /dev/null +++ b/test/test_list_acme_accounts.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.list_acme_accounts import ListAcmeAccounts # noqa: E501 +from akeyless.rest import ApiException + +class TestListAcmeAccounts(unittest.TestCase): + """ListAcmeAccounts unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ListAcmeAccounts + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.list_acme_accounts.ListAcmeAccounts() # noqa: E501 + if include_optional : + return ListAcmeAccounts( + cert_issuer_name = '0', + json = True, + token = '0', + uid_token = '0' + ) + else : + return ListAcmeAccounts( + cert_issuer_name = '0', + ) + + def testListAcmeAccounts(self): + """Test ListAcmeAccounts""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_list_acme_accounts_output.py b/test/test_list_acme_accounts_output.py new file mode 100644 index 00000000..9172e650 --- /dev/null +++ b/test/test_list_acme_accounts_output.py @@ -0,0 +1,58 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.list_acme_accounts_output import ListAcmeAccountsOutput # noqa: E501 +from akeyless.rest import ApiException + +class TestListAcmeAccountsOutput(unittest.TestCase): + """ListAcmeAccountsOutput unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ListAcmeAccountsOutput + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.list_acme_accounts_output.ListAcmeAccountsOutput() # noqa: E501 + if include_optional : + return ListAcmeAccountsOutput( + accounts = [ + akeyless.models.acme_account.AcmeAccount( + account_id = '0', + key_digest = '0', + status = '0', ) + ] + ) + else : + return ListAcmeAccountsOutput( + ) + + def testListAcmeAccountsOutput(self): + """Test ListAcmeAccountsOutput""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main()