From c8eade6e281d87f68cae49e7802e3eb3e08d6fbe Mon Sep 17 00:00:00 2001 From: akeyless Date: Wed, 6 Nov 2024 11:37:23 +0000 Subject: [PATCH] "Release v4.3.0" --- README.md | 28 +- akeyless/__init__.py | 22 +- akeyless/api/v2_api.py | 782 ++++++++++++++- akeyless/api_client.py | 2 +- akeyless/configuration.py | 2 +- akeyless/models/__init__.py | 20 + akeyless/models/akeyless_gateway_config.py | 28 +- akeyless/models/auth.py | 142 ++- akeyless/models/auth_method.py | 28 +- akeyless/models/auth_method_access_info.py | 28 +- .../models/auth_method_additional_data.py | 121 +++ .../models/auth_method_create_kerberos.py | 880 +++++++++++++++++ .../models/auth_method_update_kerberos.py | 906 ++++++++++++++++++ akeyless/models/cache_config_part.py | 28 +- akeyless/models/certificate_chain_info.py | 84 +- akeyless/models/classic_key_details_info.py | 84 +- akeyless/models/configure.py | 142 ++- akeyless/models/create_passkey.py | 433 +++++++++ akeyless/models/create_passkey_output.py | 199 ++++ akeyless/models/create_pki_cert_issuer.py | 58 +- .../models/event_forwarder_create_email.py | 4 +- .../event_forwarder_create_service_now.py | 4 +- .../models/event_forwarder_create_slack.py | 4 +- .../models/event_forwarder_create_webhook.py | 8 +- .../models/event_forwarder_update_email.py | 4 +- .../event_forwarder_update_service_now.py | 4 +- .../models/event_forwarder_update_slack.py | 4 +- .../models/event_forwarder_update_webhook.py | 8 +- akeyless/models/export_classic_key.py | 30 +- akeyless/models/import_passwords.py | 4 +- akeyless/models/kerberos_access_rules.py | 147 +++ akeyless/models/kerberos_auth_method_info.py | 407 ++++++++ akeyless/models/kerberos_config_part.py | 459 +++++++++ akeyless/models/kube_config_value.py | 251 +++++ akeyless/models/kubeconfig_cluster.py | 175 ++++ akeyless/models/kubeconfig_context.py | 173 ++++ akeyless/models/kubeconfig_exec.py | 199 ++++ akeyless/models/kubeconfig_generate_output.py | 173 ++++ akeyless/models/kubeconfig_named_cluster.py | 147 +++ akeyless/models/kubeconfig_named_context.py | 147 +++ akeyless/models/kubeconfig_user.py | 147 +++ akeyless/models/kubeconfig_user_exec.py | 121 +++ akeyless/models/list_sra_sessions.py | 235 +++++ akeyless/models/list_sra_sessions_output.py | 173 ++++ .../models/pki_certificate_issue_details.py | 54 +- akeyless/models/sign_ec_dsa.py | 30 +- akeyless/models/sra_session_entry_out.py | 485 ++++++++++ akeyless/models/update_pki_cert_issuer.py | 58 +- docs/AkeylessGatewayConfig.md | 1 + docs/Auth.md | 5 + docs/AuthMethod.md | 1 + docs/AuthMethodAccessInfo.md | 1 + docs/AuthMethodAdditionalData.md | 10 + docs/AuthMethodCreateKerberos.md | 39 + docs/AuthMethodUpdateKerberos.md | 40 + docs/CacheConfigPart.md | 1 + docs/CertificateChainInfo.md | 3 + docs/ClassicKeyDetailsInfo.md | 3 + docs/Configure.md | 5 + docs/CreatePKICertIssuer.md | 2 + docs/CreatePasskey.md | 22 + docs/CreatePasskeyOutput.md | 13 + docs/EventForwarderCreateEmail.md | 2 +- docs/EventForwarderCreateServiceNow.md | 2 +- docs/EventForwarderCreateSlack.md | 2 +- docs/EventForwarderCreateWebhook.md | 4 +- docs/EventForwarderUpdateEmail.md | 2 +- docs/EventForwarderUpdateServiceNow.md | 2 +- docs/EventForwarderUpdateSlack.md | 2 +- docs/EventForwarderUpdateWebhook.md | 4 +- docs/ExportClassicKey.md | 1 + docs/ImportPasswords.md | 2 +- docs/KerberosAccessRules.md | 11 + docs/KerberosAuthMethodInfo.md | 21 + docs/KerberosConfigPart.md | 23 + docs/KubeConfigValue.md | 15 + docs/KubeconfigCluster.md | 12 + docs/KubeconfigContext.md | 12 + docs/KubeconfigExec.md | 13 + docs/KubeconfigGenerateOutput.md | 12 + docs/KubeconfigNamedCluster.md | 11 + docs/KubeconfigNamedContext.md | 11 + docs/KubeconfigUser.md | 11 + docs/KubeconfigUserExec.md | 10 + docs/ListSRASessions.md | 15 + docs/ListSraSessionsOutput.md | 12 + docs/PKICertificateIssueDetails.md | 2 + docs/SignEcDsa.md | 1 + docs/SraSessionEntryOut.md | 24 + docs/UpdatePKICertIssuer.md | 2 + docs/V2Api.md | 378 +++++++- setup.py | 2 +- test/test_auth_method_additional_data.py | 65 ++ test/test_auth_method_create_kerberos.py | 92 ++ test/test_auth_method_update_kerberos.py | 93 ++ test/test_create_passkey.py | 70 ++ test/test_create_passkey_output.py | 56 ++ test/test_kerberos_access_rules.py | 54 ++ test/test_kerberos_auth_method_info.py | 64 ++ test/test_kerberos_config_part.py | 66 ++ test/test_kube_config_value.py | 83 ++ test/test_kubeconfig_cluster.py | 55 ++ test/test_kubeconfig_context.py | 55 ++ test/test_kubeconfig_exec.py | 58 ++ test/test_kubeconfig_generate_output.py | 89 ++ test/test_kubeconfig_named_cluster.py | 57 ++ test/test_kubeconfig_named_context.py | 57 ++ test/test_kubeconfig_user.py | 61 ++ test/test_kubeconfig_user_exec.py | 59 ++ test/test_list_sra_sessions.py | 61 ++ test/test_list_sra_sessions_output.py | 74 ++ test/test_sra_session_entry_out.py | 67 ++ 112 files changed, 9671 insertions(+), 104 deletions(-) create mode 100644 akeyless/models/auth_method_additional_data.py create mode 100644 akeyless/models/auth_method_create_kerberos.py create mode 100644 akeyless/models/auth_method_update_kerberos.py create mode 100644 akeyless/models/create_passkey.py create mode 100644 akeyless/models/create_passkey_output.py create mode 100644 akeyless/models/kerberos_access_rules.py create mode 100644 akeyless/models/kerberos_auth_method_info.py create mode 100644 akeyless/models/kerberos_config_part.py create mode 100644 akeyless/models/kube_config_value.py create mode 100644 akeyless/models/kubeconfig_cluster.py create mode 100644 akeyless/models/kubeconfig_context.py create mode 100644 akeyless/models/kubeconfig_exec.py create mode 100644 akeyless/models/kubeconfig_generate_output.py create mode 100644 akeyless/models/kubeconfig_named_cluster.py create mode 100644 akeyless/models/kubeconfig_named_context.py create mode 100644 akeyless/models/kubeconfig_user.py create mode 100644 akeyless/models/kubeconfig_user_exec.py create mode 100644 akeyless/models/list_sra_sessions.py create mode 100644 akeyless/models/list_sra_sessions_output.py create mode 100644 akeyless/models/sra_session_entry_out.py create mode 100644 docs/AuthMethodAdditionalData.md create mode 100644 docs/AuthMethodCreateKerberos.md create mode 100644 docs/AuthMethodUpdateKerberos.md create mode 100644 docs/CreatePasskey.md create mode 100644 docs/CreatePasskeyOutput.md create mode 100644 docs/KerberosAccessRules.md create mode 100644 docs/KerberosAuthMethodInfo.md create mode 100644 docs/KerberosConfigPart.md create mode 100644 docs/KubeConfigValue.md create mode 100644 docs/KubeconfigCluster.md create mode 100644 docs/KubeconfigContext.md create mode 100644 docs/KubeconfigExec.md create mode 100644 docs/KubeconfigGenerateOutput.md create mode 100644 docs/KubeconfigNamedCluster.md create mode 100644 docs/KubeconfigNamedContext.md create mode 100644 docs/KubeconfigUser.md create mode 100644 docs/KubeconfigUserExec.md create mode 100644 docs/ListSRASessions.md create mode 100644 docs/ListSraSessionsOutput.md create mode 100644 docs/SraSessionEntryOut.md create mode 100644 test/test_auth_method_additional_data.py create mode 100644 test/test_auth_method_create_kerberos.py create mode 100644 test/test_auth_method_update_kerberos.py create mode 100644 test/test_create_passkey.py create mode 100644 test/test_create_passkey_output.py create mode 100644 test/test_kerberos_access_rules.py create mode 100644 test/test_kerberos_auth_method_info.py create mode 100644 test/test_kerberos_config_part.py create mode 100644 test/test_kube_config_value.py create mode 100644 test/test_kubeconfig_cluster.py create mode 100644 test/test_kubeconfig_context.py create mode 100644 test/test_kubeconfig_exec.py create mode 100644 test/test_kubeconfig_generate_output.py create mode 100644 test/test_kubeconfig_named_cluster.py create mode 100644 test/test_kubeconfig_named_context.py create mode 100644 test/test_kubeconfig_user.py create mode 100644 test/test_kubeconfig_user_exec.py create mode 100644 test/test_list_sra_sessions.py create mode 100644 test/test_list_sra_sessions_output.py create mode 100644 test/test_sra_session_entry_out.py diff --git a/README.md b/README.md index 110a4b8f..5544d836 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ The purpose of this application is to provide access to Akeyless API. This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project: - API version: 2.0 -- Package version: 4.2.5 +- Package version: 4.3.0 - Build package: org.openapitools.codegen.languages.PythonClientCodegen For more information, please visit [http://akeyless.io](http://akeyless.io) @@ -94,6 +94,7 @@ Class | Method | HTTP request | Description *V2Api* | [**auth_method_create_email**](docs/V2Api.md#auth_method_create_email) | **POST** /auth-method-create-email | *V2Api* | [**auth_method_create_gcp**](docs/V2Api.md#auth_method_create_gcp) | **POST** /auth-method-create-gcp | *V2Api* | [**auth_method_create_k8s**](docs/V2Api.md#auth_method_create_k8s) | **POST** /auth-method-create-k8s | +*V2Api* | [**auth_method_create_kerberos**](docs/V2Api.md#auth_method_create_kerberos) | **POST** /auth-method-create-kerberos | *V2Api* | [**auth_method_create_ldap**](docs/V2Api.md#auth_method_create_ldap) | **POST** /auth-method-create-ldap | *V2Api* | [**auth_method_create_oauth2**](docs/V2Api.md#auth_method_create_oauth2) | **POST** /auth-method-create-oauth2 | *V2Api* | [**auth_method_create_oci**](docs/V2Api.md#auth_method_create_oci) | **POST** /auth-method-create-oci | @@ -110,6 +111,7 @@ Class | Method | HTTP request | Description *V2Api* | [**auth_method_update_email**](docs/V2Api.md#auth_method_update_email) | **POST** /auth-method-update-email | *V2Api* | [**auth_method_update_gcp**](docs/V2Api.md#auth_method_update_gcp) | **POST** /auth-method-update-gcp | *V2Api* | [**auth_method_update_k8s**](docs/V2Api.md#auth_method_update_k8s) | **POST** /auth-method-update-k8s | +*V2Api* | [**auth_method_update_kerberos**](docs/V2Api.md#auth_method_update_kerberos) | **POST** /auth-method-update-kerberos | *V2Api* | [**auth_method_update_ldap**](docs/V2Api.md#auth_method_update_ldap) | **POST** /auth-method-update-ldap | *V2Api* | [**auth_method_update_oauth2**](docs/V2Api.md#auth_method_update_oauth2) | **POST** /auth-method-update-oauth2 | *V2Api* | [**auth_method_update_oci**](docs/V2Api.md#auth_method_update_oci) | **POST** /auth-method-update-oci | @@ -158,6 +160,7 @@ Class | Method | HTTP request | Description *V2Api* | [**create_linked_target**](docs/V2Api.md#create_linked_target) | **POST** /create-linked-target | *V2Api* | [**create_native_k8_s_target**](docs/V2Api.md#create_native_k8_s_target) | **POST** /create-k8s-target | *V2Api* | [**create_oidc_app**](docs/V2Api.md#create_oidc_app) | **POST** /create-oidc-app | +*V2Api* | [**create_passkey**](docs/V2Api.md#create_passkey) | **POST** /create-passkey | *V2Api* | [**create_ping_target**](docs/V2Api.md#create_ping_target) | **POST** /create-ping-target | *V2Api* | [**create_pki_cert_issuer**](docs/V2Api.md#create_pki_cert_issuer) | **POST** /create-pki-cert-issuer | *V2Api* | [**create_rabbit_mq_target**](docs/V2Api.md#create_rabbit_mq_target) | **POST** /create-rabbitmq-target | @@ -434,6 +437,7 @@ Class | Method | HTTP request | Description *V2Api* | [**kmip_renew_server_certificate**](docs/V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment | *V2Api* | [**kmip_server_setup**](docs/V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment | *V2Api* | [**kmip_set_server_state**](docs/V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state | +*V2Api* | [**kubeconfig_generate**](docs/V2Api.md#kubeconfig_generate) | **POST** /kubeconfig-generate | *V2Api* | [**list_acme_accounts**](docs/V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts | *V2Api* | [**list_auth_methods**](docs/V2Api.md#list_auth_methods) | **POST** /list-auth-methods | *V2Api* | [**list_gateways**](docs/V2Api.md#list_gateways) | **POST** /list-gateways | @@ -442,6 +446,7 @@ Class | Method | HTTP request | Description *V2Api* | [**list_roles**](docs/V2Api.md#list_roles) | **POST** /list-roles | *V2Api* | [**list_shared_items**](docs/V2Api.md#list_shared_items) | **POST** /list-shared-items | *V2Api* | [**list_sra_bastions**](docs/V2Api.md#list_sra_bastions) | **POST** /list-sra-bastions | +*V2Api* | [**list_sra_sessions**](docs/V2Api.md#list_sra_sessions) | **POST** /list-sra-sessions | *V2Api* | [**list_targets**](docs/V2Api.md#list_targets) | **POST** /list-targets | *V2Api* | [**move_objects**](docs/V2Api.md#move_objects) | **POST** /move-objects | *V2Api* | [**provision_certificate**](docs/V2Api.md#provision_certificate) | **POST** /provision-certificate | @@ -449,6 +454,7 @@ Class | Method | HTTP request | Description *V2Api* | [**refresh_key**](docs/V2Api.md#refresh_key) | **POST** /refresh-key | *V2Api* | [**renew_certificate**](docs/V2Api.md#renew_certificate) | **POST** /renew-certificate | *V2Api* | [**request_access**](docs/V2Api.md#request_access) | **POST** /request-access | +*V2Api* | [**reset_access_key**](docs/V2Api.md#reset_access_key) | **POST** /reset-access-key | *V2Api* | [**reverse_rbac**](docs/V2Api.md#reverse_rbac) | **POST** /reverse-rbac | *V2Api* | [**revoke_certificate**](docs/V2Api.md#revoke_certificate) | **POST** /revoke-certificate | *V2Api* | [**revoke_creds**](docs/V2Api.md#revoke_creds) | **POST** /revoke-creds | @@ -671,6 +677,7 @@ Class | Method | HTTP request | Description - [Auth](docs/Auth.md) - [AuthMethod](docs/AuthMethod.md) - [AuthMethodAccessInfo](docs/AuthMethodAccessInfo.md) + - [AuthMethodAdditionalData](docs/AuthMethodAdditionalData.md) - [AuthMethodCreateApiKey](docs/AuthMethodCreateApiKey.md) - [AuthMethodCreateAwsIam](docs/AuthMethodCreateAwsIam.md) - [AuthMethodCreateAzureAD](docs/AuthMethodCreateAzureAD.md) @@ -678,6 +685,7 @@ Class | Method | HTTP request | Description - [AuthMethodCreateEmail](docs/AuthMethodCreateEmail.md) - [AuthMethodCreateGcp](docs/AuthMethodCreateGcp.md) - [AuthMethodCreateK8s](docs/AuthMethodCreateK8s.md) + - [AuthMethodCreateKerberos](docs/AuthMethodCreateKerberos.md) - [AuthMethodCreateLdap](docs/AuthMethodCreateLdap.md) - [AuthMethodCreateOCI](docs/AuthMethodCreateOCI.md) - [AuthMethodCreateOIDC](docs/AuthMethodCreateOIDC.md) @@ -697,6 +705,7 @@ Class | Method | HTTP request | Description - [AuthMethodUpdateEmail](docs/AuthMethodUpdateEmail.md) - [AuthMethodUpdateGcp](docs/AuthMethodUpdateGcp.md) - [AuthMethodUpdateK8s](docs/AuthMethodUpdateK8s.md) + - [AuthMethodUpdateKerberos](docs/AuthMethodUpdateKerberos.md) - [AuthMethodUpdateLdap](docs/AuthMethodUpdateLdap.md) - [AuthMethodUpdateOCI](docs/AuthMethodUpdateOCI.md) - [AuthMethodUpdateOIDC](docs/AuthMethodUpdateOIDC.md) @@ -826,6 +835,8 @@ Class | Method | HTTP request | Description - [CreateOidcAppOutput](docs/CreateOidcAppOutput.md) - [CreatePKICertIssuer](docs/CreatePKICertIssuer.md) - [CreatePKICertIssuerOutput](docs/CreatePKICertIssuerOutput.md) + - [CreatePasskey](docs/CreatePasskey.md) + - [CreatePasskeyOutput](docs/CreatePasskeyOutput.md) - [CreatePingTarget](docs/CreatePingTarget.md) - [CreatePingTargetOutput](docs/CreatePingTargetOutput.md) - [CreateRabbitMQTarget](docs/CreateRabbitMQTarget.md) @@ -1286,6 +1297,9 @@ Class | Method | HTTP request | Description - [KMIPConfigPart](docs/KMIPConfigPart.md) - [KMIPEnvironmentCreateResponse](docs/KMIPEnvironmentCreateResponse.md) - [KMIPServer](docs/KMIPServer.md) + - [KerberosAccessRules](docs/KerberosAccessRules.md) + - [KerberosAuthMethodInfo](docs/KerberosAuthMethodInfo.md) + - [KerberosConfigPart](docs/KerberosConfigPart.md) - [KmipClientDeleteRule](docs/KmipClientDeleteRule.md) - [KmipClientSetRule](docs/KmipClientSetRule.md) - [KmipCreateClient](docs/KmipCreateClient.md) @@ -1305,6 +1319,15 @@ Class | Method | HTTP request | Description - [KmipServerSetup](docs/KmipServerSetup.md) - [KmipSetServerState](docs/KmipSetServerState.md) - [KmipSetServerStateOutput](docs/KmipSetServerStateOutput.md) + - [KubeConfigValue](docs/KubeConfigValue.md) + - [KubeconfigCluster](docs/KubeconfigCluster.md) + - [KubeconfigContext](docs/KubeconfigContext.md) + - [KubeconfigExec](docs/KubeconfigExec.md) + - [KubeconfigGenerateOutput](docs/KubeconfigGenerateOutput.md) + - [KubeconfigNamedCluster](docs/KubeconfigNamedCluster.md) + - [KubeconfigNamedContext](docs/KubeconfigNamedContext.md) + - [KubeconfigUser](docs/KubeconfigUser.md) + - [KubeconfigUserExec](docs/KubeconfigUserExec.md) - [KubernetesAccessRules](docs/KubernetesAccessRules.md) - [LDAPAccessRules](docs/LDAPAccessRules.md) - [LastConfigChange](docs/LastConfigChange.md) @@ -1327,7 +1350,9 @@ Class | Method | HTTP request | Description - [ListRoles](docs/ListRoles.md) - [ListRolesOutput](docs/ListRolesOutput.md) - [ListSRABastions](docs/ListSRABastions.md) + - [ListSRASessions](docs/ListSRASessions.md) - [ListSharedItems](docs/ListSharedItems.md) + - [ListSraSessionsOutput](docs/ListSraSessionsOutput.md) - [ListTargets](docs/ListTargets.md) - [ListTargetsOutput](docs/ListTargetsOutput.md) - [LogForwardingConfigPart](docs/LogForwardingConfigPart.md) @@ -1470,6 +1495,7 @@ Class | Method | HTTP request | Description - [SmInfo](docs/SmInfo.md) - [SplunkLogForwardingConfig](docs/SplunkLogForwardingConfig.md) - [SraInfo](docs/SraInfo.md) + - [SraSessionEntryOut](docs/SraSessionEntryOut.md) - [SshBastionConf](docs/SshBastionConf.md) - [SshBastionSessionTermination](docs/SshBastionSessionTermination.md) - [StaticCredsAuth](docs/StaticCredsAuth.md) diff --git a/akeyless/__init__.py b/akeyless/__init__.py index 1db0c3d7..1d2111d9 100644 --- a/akeyless/__init__.py +++ b/akeyless/__init__.py @@ -15,7 +15,7 @@ from __future__ import absolute_import -__version__ = "4.2.5" +__version__ = "4.3.0" # import apis into sdk package from akeyless.api.v2_api import V2Api @@ -57,6 +57,7 @@ from akeyless.models.auth import Auth from akeyless.models.auth_method import AuthMethod from akeyless.models.auth_method_access_info import AuthMethodAccessInfo +from akeyless.models.auth_method_additional_data import AuthMethodAdditionalData from akeyless.models.auth_method_create_api_key import AuthMethodCreateApiKey from akeyless.models.auth_method_create_aws_iam import AuthMethodCreateAwsIam from akeyless.models.auth_method_create_azure_ad import AuthMethodCreateAzureAD @@ -64,6 +65,7 @@ from akeyless.models.auth_method_create_email import AuthMethodCreateEmail from akeyless.models.auth_method_create_gcp import AuthMethodCreateGcp from akeyless.models.auth_method_create_k8s import AuthMethodCreateK8s +from akeyless.models.auth_method_create_kerberos import AuthMethodCreateKerberos from akeyless.models.auth_method_create_ldap import AuthMethodCreateLdap from akeyless.models.auth_method_create_oci import AuthMethodCreateOCI from akeyless.models.auth_method_create_oidc import AuthMethodCreateOIDC @@ -83,6 +85,7 @@ from akeyless.models.auth_method_update_email import AuthMethodUpdateEmail from akeyless.models.auth_method_update_gcp import AuthMethodUpdateGcp from akeyless.models.auth_method_update_k8s import AuthMethodUpdateK8s +from akeyless.models.auth_method_update_kerberos import AuthMethodUpdateKerberos from akeyless.models.auth_method_update_ldap import AuthMethodUpdateLdap from akeyless.models.auth_method_update_oci import AuthMethodUpdateOCI from akeyless.models.auth_method_update_oidc import AuthMethodUpdateOIDC @@ -212,6 +215,8 @@ from akeyless.models.create_oidc_app_output import CreateOidcAppOutput from akeyless.models.create_pki_cert_issuer import CreatePKICertIssuer from akeyless.models.create_pki_cert_issuer_output import CreatePKICertIssuerOutput +from akeyless.models.create_passkey import CreatePasskey +from akeyless.models.create_passkey_output import CreatePasskeyOutput from akeyless.models.create_ping_target import CreatePingTarget from akeyless.models.create_ping_target_output import CreatePingTargetOutput from akeyless.models.create_rabbit_mq_target import CreateRabbitMQTarget @@ -672,6 +677,9 @@ from akeyless.models.kmip_config_part import KMIPConfigPart from akeyless.models.kmip_environment_create_response import KMIPEnvironmentCreateResponse from akeyless.models.kmip_server import KMIPServer +from akeyless.models.kerberos_access_rules import KerberosAccessRules +from akeyless.models.kerberos_auth_method_info import KerberosAuthMethodInfo +from akeyless.models.kerberos_config_part import KerberosConfigPart from akeyless.models.kmip_client_delete_rule import KmipClientDeleteRule from akeyless.models.kmip_client_set_rule import KmipClientSetRule from akeyless.models.kmip_create_client import KmipCreateClient @@ -691,6 +699,15 @@ from akeyless.models.kmip_server_setup import KmipServerSetup from akeyless.models.kmip_set_server_state import KmipSetServerState from akeyless.models.kmip_set_server_state_output import KmipSetServerStateOutput +from akeyless.models.kube_config_value import KubeConfigValue +from akeyless.models.kubeconfig_cluster import KubeconfigCluster +from akeyless.models.kubeconfig_context import KubeconfigContext +from akeyless.models.kubeconfig_exec import KubeconfigExec +from akeyless.models.kubeconfig_generate_output import KubeconfigGenerateOutput +from akeyless.models.kubeconfig_named_cluster import KubeconfigNamedCluster +from akeyless.models.kubeconfig_named_context import KubeconfigNamedContext +from akeyless.models.kubeconfig_user import KubeconfigUser +from akeyless.models.kubeconfig_user_exec import KubeconfigUserExec from akeyless.models.kubernetes_access_rules import KubernetesAccessRules from akeyless.models.ldap_access_rules import LDAPAccessRules from akeyless.models.last_config_change import LastConfigChange @@ -713,7 +730,9 @@ from akeyless.models.list_roles import ListRoles from akeyless.models.list_roles_output import ListRolesOutput from akeyless.models.list_sra_bastions import ListSRABastions +from akeyless.models.list_sra_sessions import ListSRASessions from akeyless.models.list_shared_items import ListSharedItems +from akeyless.models.list_sra_sessions_output import ListSraSessionsOutput from akeyless.models.list_targets import ListTargets from akeyless.models.list_targets_output import ListTargetsOutput from akeyless.models.log_forwarding_config_part import LogForwardingConfigPart @@ -856,6 +875,7 @@ from akeyless.models.sm_info import SmInfo from akeyless.models.splunk_log_forwarding_config import SplunkLogForwardingConfig from akeyless.models.sra_info import SraInfo +from akeyless.models.sra_session_entry_out import SraSessionEntryOut from akeyless.models.ssh_bastion_conf import SshBastionConf from akeyless.models.ssh_bastion_session_termination import SshBastionSessionTermination from akeyless.models.static_creds_auth import StaticCredsAuth diff --git a/akeyless/api/v2_api.py b/akeyless/api/v2_api.py index 5127c8c9..dec4ef9b 100644 --- a/akeyless/api/v2_api.py +++ b/akeyless/api/v2_api.py @@ -1313,6 +1313,122 @@ def auth_method_create_k8s_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def auth_method_create_kerberos(self, body, **kwargs): # noqa: E501 + """auth_method_create_kerberos # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.auth_method_create_kerberos(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param AuthMethodCreateKerberos body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: AuthMethodCreateOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.auth_method_create_kerberos_with_http_info(body, **kwargs) # noqa: E501 + + def auth_method_create_kerberos_with_http_info(self, body, **kwargs): # noqa: E501 + """auth_method_create_kerberos # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.auth_method_create_kerberos_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param AuthMethodCreateKerberos body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(AuthMethodCreateOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method auth_method_create_kerberos" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `auth_method_create_kerberos`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/auth-method-create-kerberos', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='AuthMethodCreateOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def auth_method_create_ldap(self, body, **kwargs): # noqa: E501 """auth_method_create_ldap # noqa: E501 @@ -3169,6 +3285,122 @@ def auth_method_update_k8s_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def auth_method_update_kerberos(self, body, **kwargs): # noqa: E501 + """auth_method_update_kerberos # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.auth_method_update_kerberos(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param AuthMethodUpdateKerberos body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: AuthMethodCreateOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.auth_method_update_kerberos_with_http_info(body, **kwargs) # noqa: E501 + + def auth_method_update_kerberos_with_http_info(self, body, **kwargs): # noqa: E501 + """auth_method_update_kerberos # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.auth_method_update_kerberos_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param AuthMethodUpdateKerberos body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(AuthMethodCreateOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method auth_method_update_kerberos" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `auth_method_update_kerberos`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/auth-method-update-kerberos', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='AuthMethodCreateOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def auth_method_update_ldap(self, body, **kwargs): # noqa: E501 """auth_method_update_ldap # noqa: E501 @@ -8737,6 +8969,122 @@ def create_oidc_app_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def create_passkey(self, body, **kwargs): # noqa: E501 + """create_passkey # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.create_passkey(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param CreatePasskey body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: CreatePasskeyOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.create_passkey_with_http_info(body, **kwargs) # noqa: E501 + + def create_passkey_with_http_info(self, body, **kwargs): # noqa: E501 + """create_passkey # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.create_passkey_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param CreatePasskey body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(CreatePasskeyOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method create_passkey" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `create_passkey`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/create-passkey', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='CreatePasskeyOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def create_ping_target(self, body, **kwargs): # noqa: E501 """create_ping_target # noqa: E501 @@ -34817,15 +35165,16 @@ def gateway_update_producer_venafi_with_http_info(self, body, **kwargs): # noqa _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) - def gateway_update_remote_access(self, **kwargs): # noqa: E501 + def gateway_update_remote_access(self, body, **kwargs): # noqa: E501 """gateway_update_remote_access # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.gateway_update_remote_access(async_req=True) + >>> thread = api.gateway_update_remote_access(body, async_req=True) >>> result = thread.get() :param async_req bool: execute request asynchronously + :param GatewayUpdateRemoteAccess body: (required) :param _preload_content: if False, the urllib3.HTTPResponse object will be returned without reading/decoding response data. Default is True. @@ -34838,17 +35187,18 @@ def gateway_update_remote_access(self, **kwargs): # noqa: E501 returns the request thread. """ kwargs['_return_http_data_only'] = True - return self.gateway_update_remote_access_with_http_info(**kwargs) # noqa: E501 + return self.gateway_update_remote_access_with_http_info(body, **kwargs) # noqa: E501 - def gateway_update_remote_access_with_http_info(self, **kwargs): # noqa: E501 + def gateway_update_remote_access_with_http_info(self, body, **kwargs): # noqa: E501 """gateway_update_remote_access # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.gateway_update_remote_access_with_http_info(async_req=True) + >>> thread = api.gateway_update_remote_access_with_http_info(body, async_req=True) >>> result = thread.get() :param async_req bool: execute request asynchronously + :param GatewayUpdateRemoteAccess body: (required) :param _return_http_data_only: response data without head status code and headers :param _preload_content: if False, the urllib3.HTTPResponse object will @@ -34866,6 +35216,7 @@ def gateway_update_remote_access_with_http_info(self, **kwargs): # noqa: E501 local_var_params = locals() all_params = [ + 'body' ] all_params.extend( [ @@ -34884,6 +35235,10 @@ def gateway_update_remote_access_with_http_info(self, **kwargs): # noqa: E501 ) local_var_params[key] = val del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `gateway_update_remote_access`") # noqa: E501 collection_formats = {} @@ -34897,10 +35252,16 @@ def gateway_update_remote_access_with_http_info(self, **kwargs): # noqa: E501 local_var_files = {} body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] # HTTP header `Accept` header_params['Accept'] = self.api_client.select_header_accept( ['application/json']) # noqa: E501 + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + # Authentication setting auth_settings = [] # noqa: E501 @@ -40385,7 +40746,119 @@ def kmip_renew_server_certificate_with_http_info(self, **kwargs): # noqa: E501 if key not in all_params: raise ApiTypeError( "Got an unexpected keyword argument '%s'" - " to method kmip_renew_server_certificate" % key + " to method kmip_renew_server_certificate" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/kmip-renew-environment', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='KmipRenewServerCertificateOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + + def kmip_server_setup(self, **kwargs): # noqa: E501 + """kmip_server_setup # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.kmip_server_setup(async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param KmipServerSetup body: + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: KMIPEnvironmentCreateResponse + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.kmip_server_setup_with_http_info(**kwargs) # noqa: E501 + + def kmip_server_setup_with_http_info(self, **kwargs): # noqa: E501 + """kmip_server_setup # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.kmip_server_setup_with_http_info(async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param KmipServerSetup body: + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(KMIPEnvironmentCreateResponse, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method kmip_server_setup" % key ) local_var_params[key] = val del local_var_params['kwargs'] @@ -40416,14 +40889,14 @@ def kmip_renew_server_certificate_with_http_info(self, **kwargs): # noqa: E501 auth_settings = [] # noqa: E501 return self.api_client.call_api( - '/kmip-renew-environment', 'POST', + '/kmip-create-environment', 'POST', path_params, query_params, header_params, body=body_params, post_params=form_params, files=local_var_files, - response_type='KmipRenewServerCertificateOutput', # noqa: E501 + response_type='KMIPEnvironmentCreateResponse', # noqa: E501 auth_settings=auth_settings, async_req=local_var_params.get('async_req'), _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 @@ -40431,16 +40904,16 @@ def kmip_renew_server_certificate_with_http_info(self, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) - def kmip_server_setup(self, **kwargs): # noqa: E501 - """kmip_server_setup # noqa: E501 + def kmip_set_server_state(self, **kwargs): # noqa: E501 + """kmip_set_server_state # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.kmip_server_setup(async_req=True) + >>> thread = api.kmip_set_server_state(async_req=True) >>> result = thread.get() :param async_req bool: execute request asynchronously - :param KmipServerSetup body: + :param KmipSetServerState body: :param _preload_content: if False, the urllib3.HTTPResponse object will be returned without reading/decoding response data. Default is True. @@ -40448,23 +40921,23 @@ def kmip_server_setup(self, **kwargs): # noqa: E501 number provided, it will be total request timeout. It can also be a pair (tuple) of (connection, read) timeouts. - :return: KMIPEnvironmentCreateResponse + :return: KmipSetServerStateOutput If the method is called asynchronously, returns the request thread. """ kwargs['_return_http_data_only'] = True - return self.kmip_server_setup_with_http_info(**kwargs) # noqa: E501 + return self.kmip_set_server_state_with_http_info(**kwargs) # noqa: E501 - def kmip_server_setup_with_http_info(self, **kwargs): # noqa: E501 - """kmip_server_setup # noqa: E501 + def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 + """kmip_set_server_state # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.kmip_server_setup_with_http_info(async_req=True) + >>> thread = api.kmip_set_server_state_with_http_info(async_req=True) >>> result = thread.get() :param async_req bool: execute request asynchronously - :param KmipServerSetup body: + :param KmipSetServerState body: :param _return_http_data_only: response data without head status code and headers :param _preload_content: if False, the urllib3.HTTPResponse object will @@ -40474,7 +40947,7 @@ def kmip_server_setup_with_http_info(self, **kwargs): # noqa: E501 number provided, it will be total request timeout. It can also be a pair (tuple) of (connection, read) timeouts. - :return: tuple(KMIPEnvironmentCreateResponse, status_code(int), headers(HTTPHeaderDict)) + :return: tuple(KmipSetServerStateOutput, status_code(int), headers(HTTPHeaderDict)) If the method is called asynchronously, returns the request thread. """ @@ -40497,7 +40970,7 @@ def kmip_server_setup_with_http_info(self, **kwargs): # noqa: E501 if key not in all_params: raise ApiTypeError( "Got an unexpected keyword argument '%s'" - " to method kmip_server_setup" % key + " to method kmip_set_server_state" % key ) local_var_params[key] = val del local_var_params['kwargs'] @@ -40528,14 +41001,14 @@ def kmip_server_setup_with_http_info(self, **kwargs): # noqa: E501 auth_settings = [] # noqa: E501 return self.api_client.call_api( - '/kmip-create-environment', 'POST', + '/kmip-set-environment-state', 'POST', path_params, query_params, header_params, body=body_params, post_params=form_params, files=local_var_files, - response_type='KMIPEnvironmentCreateResponse', # noqa: E501 + response_type='KmipSetServerStateOutput', # noqa: E501 auth_settings=auth_settings, async_req=local_var_params.get('async_req'), _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 @@ -40543,16 +41016,15 @@ def kmip_server_setup_with_http_info(self, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) - def kmip_set_server_state(self, **kwargs): # noqa: E501 - """kmip_set_server_state # noqa: E501 + def kubeconfig_generate(self, **kwargs): # noqa: E501 + """kubeconfig_generate # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.kmip_set_server_state(async_req=True) + >>> thread = api.kubeconfig_generate(async_req=True) >>> result = thread.get() :param async_req bool: execute request asynchronously - :param KmipSetServerState body: :param _preload_content: if False, the urllib3.HTTPResponse object will be returned without reading/decoding response data. Default is True. @@ -40560,23 +41032,22 @@ def kmip_set_server_state(self, **kwargs): # noqa: E501 number provided, it will be total request timeout. It can also be a pair (tuple) of (connection, read) timeouts. - :return: KmipSetServerStateOutput + :return: KubeconfigGenerateOutput If the method is called asynchronously, returns the request thread. """ kwargs['_return_http_data_only'] = True - return self.kmip_set_server_state_with_http_info(**kwargs) # noqa: E501 + return self.kubeconfig_generate_with_http_info(**kwargs) # noqa: E501 - def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 - """kmip_set_server_state # noqa: E501 + def kubeconfig_generate_with_http_info(self, **kwargs): # noqa: E501 + """kubeconfig_generate # noqa: E501 This method makes a synchronous HTTP request by default. To make an asynchronous HTTP request, please pass async_req=True - >>> thread = api.kmip_set_server_state_with_http_info(async_req=True) + >>> thread = api.kubeconfig_generate_with_http_info(async_req=True) >>> result = thread.get() :param async_req bool: execute request asynchronously - :param KmipSetServerState body: :param _return_http_data_only: response data without head status code and headers :param _preload_content: if False, the urllib3.HTTPResponse object will @@ -40586,7 +41057,7 @@ def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 number provided, it will be total request timeout. It can also be a pair (tuple) of (connection, read) timeouts. - :return: tuple(KmipSetServerStateOutput, status_code(int), headers(HTTPHeaderDict)) + :return: tuple(KubeconfigGenerateOutput, status_code(int), headers(HTTPHeaderDict)) If the method is called asynchronously, returns the request thread. """ @@ -40594,7 +41065,6 @@ def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 local_var_params = locals() all_params = [ - 'body' ] all_params.extend( [ @@ -40609,7 +41079,7 @@ def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 if key not in all_params: raise ApiTypeError( "Got an unexpected keyword argument '%s'" - " to method kmip_set_server_state" % key + " to method kubeconfig_generate" % key ) local_var_params[key] = val del local_var_params['kwargs'] @@ -40626,28 +41096,22 @@ def kmip_set_server_state_with_http_info(self, **kwargs): # noqa: E501 local_var_files = {} body_params = None - if 'body' in local_var_params: - body_params = local_var_params['body'] # HTTP header `Accept` header_params['Accept'] = self.api_client.select_header_accept( ['application/json']) # noqa: E501 - # HTTP header `Content-Type` - header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 - ['application/json']) # noqa: E501 - # Authentication setting auth_settings = [] # noqa: E501 return self.api_client.call_api( - '/kmip-set-environment-state', 'POST', + '/kubeconfig-generate', 'POST', path_params, query_params, header_params, body=body_params, post_params=form_params, files=local_var_files, - response_type='KmipSetServerStateOutput', # noqa: E501 + response_type='KubeconfigGenerateOutput', # noqa: E501 auth_settings=auth_settings, async_req=local_var_params.get('async_req'), _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 @@ -41583,6 +42047,122 @@ def list_sra_bastions_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def list_sra_sessions(self, body, **kwargs): # noqa: E501 + """list_sra_sessions # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.list_sra_sessions(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ListSRASessions body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: ListSraSessionsOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.list_sra_sessions_with_http_info(body, **kwargs) # noqa: E501 + + def list_sra_sessions_with_http_info(self, body, **kwargs): # noqa: E501 + """list_sra_sessions # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.list_sra_sessions_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ListSRASessions body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(ListSraSessionsOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method list_sra_sessions" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `list_sra_sessions`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/list-sra-sessions', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='ListSraSessionsOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def list_targets(self, body, **kwargs): # noqa: E501 """list_targets # noqa: E501 @@ -42391,6 +42971,122 @@ def request_access_with_http_info(self, body, **kwargs): # noqa: E501 _request_timeout=local_var_params.get('_request_timeout'), collection_formats=collection_formats) + def reset_access_key(self, body, **kwargs): # noqa: E501 + """reset_access_key # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.reset_access_key(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ResetAccessKey body: (required) + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: ResetAuthMethodAccessKeyOutput + If the method is called asynchronously, + returns the request thread. + """ + kwargs['_return_http_data_only'] = True + return self.reset_access_key_with_http_info(body, **kwargs) # noqa: E501 + + def reset_access_key_with_http_info(self, body, **kwargs): # noqa: E501 + """reset_access_key # noqa: E501 + + This method makes a synchronous HTTP request by default. To make an + asynchronous HTTP request, please pass async_req=True + >>> thread = api.reset_access_key_with_http_info(body, async_req=True) + >>> result = thread.get() + + :param async_req bool: execute request asynchronously + :param ResetAccessKey body: (required) + :param _return_http_data_only: response data without head status code + and headers + :param _preload_content: if False, the urllib3.HTTPResponse object will + be returned without reading/decoding response + data. Default is True. + :param _request_timeout: timeout setting for this request. If one + number provided, it will be total request + timeout. It can also be a pair (tuple) of + (connection, read) timeouts. + :return: tuple(ResetAuthMethodAccessKeyOutput, status_code(int), headers(HTTPHeaderDict)) + If the method is called asynchronously, + returns the request thread. + """ + + local_var_params = locals() + + all_params = [ + 'body' + ] + all_params.extend( + [ + 'async_req', + '_return_http_data_only', + '_preload_content', + '_request_timeout' + ] + ) + + for key, val in six.iteritems(local_var_params['kwargs']): + if key not in all_params: + raise ApiTypeError( + "Got an unexpected keyword argument '%s'" + " to method reset_access_key" % key + ) + local_var_params[key] = val + del local_var_params['kwargs'] + # verify the required parameter 'body' is set + if self.api_client.client_side_validation and ('body' not in local_var_params or # noqa: E501 + local_var_params['body'] is None): # noqa: E501 + raise ApiValueError("Missing the required parameter `body` when calling `reset_access_key`") # noqa: E501 + + collection_formats = {} + + path_params = {} + + query_params = [] + + header_params = {} + + form_params = [] + local_var_files = {} + + body_params = None + if 'body' in local_var_params: + body_params = local_var_params['body'] + # HTTP header `Accept` + header_params['Accept'] = self.api_client.select_header_accept( + ['application/json']) # noqa: E501 + + # HTTP header `Content-Type` + header_params['Content-Type'] = self.api_client.select_header_content_type( # noqa: E501 + ['application/json']) # noqa: E501 + + # Authentication setting + auth_settings = [] # noqa: E501 + + return self.api_client.call_api( + '/reset-access-key', 'POST', + path_params, + query_params, + header_params, + body=body_params, + post_params=form_params, + files=local_var_files, + response_type='ResetAuthMethodAccessKeyOutput', # noqa: E501 + auth_settings=auth_settings, + async_req=local_var_params.get('async_req'), + _return_http_data_only=local_var_params.get('_return_http_data_only'), # noqa: E501 + _preload_content=local_var_params.get('_preload_content', True), + _request_timeout=local_var_params.get('_request_timeout'), + collection_formats=collection_formats) + def reverse_rbac(self, body, **kwargs): # noqa: E501 """reverse_rbac # noqa: E501 diff --git a/akeyless/api_client.py b/akeyless/api_client.py index 51c07fc1..0b967f79 100644 --- a/akeyless/api_client.py +++ b/akeyless/api_client.py @@ -79,7 +79,7 @@ def __init__(self, configuration=None, header_name=None, header_value=None, self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/4.2.5/python' + self.user_agent = 'OpenAPI-Generator/4.3.0/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/akeyless/configuration.py b/akeyless/configuration.py index 461efff1..aa5014c4 100644 --- a/akeyless/configuration.py +++ b/akeyless/configuration.py @@ -326,7 +326,7 @@ def to_debug_report(self): "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: 2.0\n"\ - "SDK Package Version: 4.2.5".\ + "SDK Package Version: 4.3.0".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self): diff --git a/akeyless/models/__init__.py b/akeyless/models/__init__.py index 5404cf98..0beb3a17 100644 --- a/akeyless/models/__init__.py +++ b/akeyless/models/__init__.py @@ -43,6 +43,7 @@ from akeyless.models.auth import Auth from akeyless.models.auth_method import AuthMethod from akeyless.models.auth_method_access_info import AuthMethodAccessInfo +from akeyless.models.auth_method_additional_data import AuthMethodAdditionalData from akeyless.models.auth_method_create_api_key import AuthMethodCreateApiKey from akeyless.models.auth_method_create_aws_iam import AuthMethodCreateAwsIam from akeyless.models.auth_method_create_azure_ad import AuthMethodCreateAzureAD @@ -50,6 +51,7 @@ from akeyless.models.auth_method_create_email import AuthMethodCreateEmail from akeyless.models.auth_method_create_gcp import AuthMethodCreateGcp from akeyless.models.auth_method_create_k8s import AuthMethodCreateK8s +from akeyless.models.auth_method_create_kerberos import AuthMethodCreateKerberos from akeyless.models.auth_method_create_ldap import AuthMethodCreateLdap from akeyless.models.auth_method_create_oci import AuthMethodCreateOCI from akeyless.models.auth_method_create_oidc import AuthMethodCreateOIDC @@ -69,6 +71,7 @@ from akeyless.models.auth_method_update_email import AuthMethodUpdateEmail from akeyless.models.auth_method_update_gcp import AuthMethodUpdateGcp from akeyless.models.auth_method_update_k8s import AuthMethodUpdateK8s +from akeyless.models.auth_method_update_kerberos import AuthMethodUpdateKerberos from akeyless.models.auth_method_update_ldap import AuthMethodUpdateLdap from akeyless.models.auth_method_update_oci import AuthMethodUpdateOCI from akeyless.models.auth_method_update_oidc import AuthMethodUpdateOIDC @@ -198,6 +201,8 @@ from akeyless.models.create_oidc_app_output import CreateOidcAppOutput from akeyless.models.create_pki_cert_issuer import CreatePKICertIssuer from akeyless.models.create_pki_cert_issuer_output import CreatePKICertIssuerOutput +from akeyless.models.create_passkey import CreatePasskey +from akeyless.models.create_passkey_output import CreatePasskeyOutput from akeyless.models.create_ping_target import CreatePingTarget from akeyless.models.create_ping_target_output import CreatePingTargetOutput from akeyless.models.create_rabbit_mq_target import CreateRabbitMQTarget @@ -658,6 +663,9 @@ from akeyless.models.kmip_config_part import KMIPConfigPart from akeyless.models.kmip_environment_create_response import KMIPEnvironmentCreateResponse from akeyless.models.kmip_server import KMIPServer +from akeyless.models.kerberos_access_rules import KerberosAccessRules +from akeyless.models.kerberos_auth_method_info import KerberosAuthMethodInfo +from akeyless.models.kerberos_config_part import KerberosConfigPart from akeyless.models.kmip_client_delete_rule import KmipClientDeleteRule from akeyless.models.kmip_client_set_rule import KmipClientSetRule from akeyless.models.kmip_create_client import KmipCreateClient @@ -677,6 +685,15 @@ from akeyless.models.kmip_server_setup import KmipServerSetup from akeyless.models.kmip_set_server_state import KmipSetServerState from akeyless.models.kmip_set_server_state_output import KmipSetServerStateOutput +from akeyless.models.kube_config_value import KubeConfigValue +from akeyless.models.kubeconfig_cluster import KubeconfigCluster +from akeyless.models.kubeconfig_context import KubeconfigContext +from akeyless.models.kubeconfig_exec import KubeconfigExec +from akeyless.models.kubeconfig_generate_output import KubeconfigGenerateOutput +from akeyless.models.kubeconfig_named_cluster import KubeconfigNamedCluster +from akeyless.models.kubeconfig_named_context import KubeconfigNamedContext +from akeyless.models.kubeconfig_user import KubeconfigUser +from akeyless.models.kubeconfig_user_exec import KubeconfigUserExec from akeyless.models.kubernetes_access_rules import KubernetesAccessRules from akeyless.models.ldap_access_rules import LDAPAccessRules from akeyless.models.last_config_change import LastConfigChange @@ -699,7 +716,9 @@ from akeyless.models.list_roles import ListRoles from akeyless.models.list_roles_output import ListRolesOutput from akeyless.models.list_sra_bastions import ListSRABastions +from akeyless.models.list_sra_sessions import ListSRASessions from akeyless.models.list_shared_items import ListSharedItems +from akeyless.models.list_sra_sessions_output import ListSraSessionsOutput from akeyless.models.list_targets import ListTargets from akeyless.models.list_targets_output import ListTargetsOutput from akeyless.models.log_forwarding_config_part import LogForwardingConfigPart @@ -842,6 +861,7 @@ from akeyless.models.sm_info import SmInfo from akeyless.models.splunk_log_forwarding_config import SplunkLogForwardingConfig from akeyless.models.sra_info import SraInfo +from akeyless.models.sra_session_entry_out import SraSessionEntryOut from akeyless.models.ssh_bastion_conf import SshBastionConf from akeyless.models.ssh_bastion_session_termination import SshBastionSessionTermination from akeyless.models.static_creds_auth import StaticCredsAuth diff --git a/akeyless/models/akeyless_gateway_config.py b/akeyless/models/akeyless_gateway_config.py index a64a6bd8..e323aa2c 100644 --- a/akeyless/models/akeyless_gateway_config.py +++ b/akeyless/models/akeyless_gateway_config.py @@ -40,6 +40,7 @@ class AkeylessGatewayConfig(object): 'config_protection_key_name': 'str', 'general': 'GeneralConfigPart', 'k8s_auths': 'K8SAuthsConfigPart', + 'kerberos': 'KerberosConfigPart', 'kmip_clients': 'KMIPConfigPart', 'ldap': 'LdapConfigPart', 'leadership': 'LeadershipConfigPart', @@ -59,6 +60,7 @@ class AkeylessGatewayConfig(object): 'config_protection_key_name': 'config_protection_key_name', 'general': 'general', 'k8s_auths': 'k8s_auths', + 'kerberos': 'kerberos', 'kmip_clients': 'kmip_clients', 'ldap': 'ldap', 'leadership': 'leadership', @@ -71,7 +73,7 @@ class AkeylessGatewayConfig(object): 'version': 'version' } - def __init__(self, admins=None, cache=None, cf=None, config_protection_key_name=None, general=None, k8s_auths=None, kmip_clients=None, ldap=None, leadership=None, log_forwarding=None, message_queue_info=None, migrations=None, producers=None, rotators=None, saml=None, version=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, admins=None, cache=None, cf=None, config_protection_key_name=None, general=None, k8s_auths=None, kerberos=None, kmip_clients=None, ldap=None, leadership=None, log_forwarding=None, message_queue_info=None, migrations=None, producers=None, rotators=None, saml=None, version=None, local_vars_configuration=None): # noqa: E501 """AkeylessGatewayConfig - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -83,6 +85,7 @@ def __init__(self, admins=None, cache=None, cf=None, config_protection_key_name= self._config_protection_key_name = None self._general = None self._k8s_auths = None + self._kerberos = None self._kmip_clients = None self._ldap = None self._leadership = None @@ -107,6 +110,8 @@ def __init__(self, admins=None, cache=None, cf=None, config_protection_key_name= self.general = general if k8s_auths is not None: self.k8s_auths = k8s_auths + if kerberos is not None: + self.kerberos = kerberos if kmip_clients is not None: self.kmip_clients = kmip_clients if ldap is not None: @@ -254,6 +259,27 @@ def k8s_auths(self, k8s_auths): self._k8s_auths = k8s_auths + @property + def kerberos(self): + """Gets the kerberos of this AkeylessGatewayConfig. # noqa: E501 + + + :return: The kerberos of this AkeylessGatewayConfig. # noqa: E501 + :rtype: KerberosConfigPart + """ + return self._kerberos + + @kerberos.setter + def kerberos(self, kerberos): + """Sets the kerberos of this AkeylessGatewayConfig. + + + :param kerberos: The kerberos of this AkeylessGatewayConfig. # noqa: E501 + :type: KerberosConfigPart + """ + + self._kerberos = kerberos + @property def kmip_clients(self): """Gets the kmip_clients of this AkeylessGatewayConfig. # noqa: E501 diff --git a/akeyless/models/auth.py b/akeyless/models/auth.py index 1b9b4ea2..0d7d0f60 100644 --- a/akeyless/models/auth.py +++ b/akeyless/models/auth.py @@ -43,13 +43,18 @@ class Auth(object): 'cert_data': 'str', 'cloud_id': 'str', 'debug': 'bool', + 'disable_pafxfast': 'str', + 'gateway_spn': 'str', 'gateway_url': 'str', 'gcp_audience': 'str', 'json': 'bool', 'jwt': 'str', 'k8s_auth_config_name': 'str', 'k8s_service_account_token': 'str', + 'kerberos_username': 'str', 'key_data': 'str', + 'keytab_data': 'str', + 'krb5_conf_data': 'str', 'ldap_password': 'str', 'ldap_username': 'str', 'oci_auth_type': 'str', @@ -68,13 +73,18 @@ class Auth(object): 'cert_data': 'cert-data', 'cloud_id': 'cloud-id', 'debug': 'debug', + 'disable_pafxfast': 'disable-pafxfast', + 'gateway_spn': 'gateway-spn', 'gateway_url': 'gateway-url', 'gcp_audience': 'gcp-audience', 'json': 'json', 'jwt': 'jwt', 'k8s_auth_config_name': 'k8s-auth-config-name', 'k8s_service_account_token': 'k8s-service-account-token', + 'kerberos_username': 'kerberos-username', 'key_data': 'key-data', + 'keytab_data': 'keytab-data', + 'krb5_conf_data': 'krb5-conf-data', 'ldap_password': 'ldap_password', 'ldap_username': 'ldap_username', 'oci_auth_type': 'oci-auth-type', @@ -83,7 +93,7 @@ class Auth(object): 'use_remote_browser': 'use-remote-browser' } - def __init__(self, access_id=None, access_key=None, access_type='access_key', account_id=None, admin_email=None, admin_password=None, cert_data=None, cloud_id=None, debug=None, gateway_url=None, gcp_audience='akeyless.io', json=False, jwt=None, k8s_auth_config_name=None, k8s_service_account_token=None, key_data=None, ldap_password=None, ldap_username=None, oci_auth_type='apikey', oci_group_ocid=None, uid_token=None, use_remote_browser=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, access_id=None, access_key=None, access_type='access_key', account_id=None, admin_email=None, admin_password=None, cert_data=None, cloud_id=None, debug=None, disable_pafxfast=None, gateway_spn=None, gateway_url=None, gcp_audience='akeyless.io', json=False, jwt=None, k8s_auth_config_name=None, k8s_service_account_token=None, kerberos_username=None, key_data=None, keytab_data=None, krb5_conf_data=None, ldap_password=None, ldap_username=None, oci_auth_type='apikey', oci_group_ocid=None, uid_token=None, use_remote_browser=None, local_vars_configuration=None): # noqa: E501 """Auth - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -98,13 +108,18 @@ def __init__(self, access_id=None, access_key=None, access_type='access_key', ac self._cert_data = None self._cloud_id = None self._debug = None + self._disable_pafxfast = None + self._gateway_spn = None self._gateway_url = None self._gcp_audience = None self._json = None self._jwt = None self._k8s_auth_config_name = None self._k8s_service_account_token = None + self._kerberos_username = None self._key_data = None + self._keytab_data = None + self._krb5_conf_data = None self._ldap_password = None self._ldap_username = None self._oci_auth_type = None @@ -131,6 +146,10 @@ def __init__(self, access_id=None, access_key=None, access_type='access_key', ac self.cloud_id = cloud_id if debug is not None: self.debug = debug + if disable_pafxfast is not None: + self.disable_pafxfast = disable_pafxfast + if gateway_spn is not None: + self.gateway_spn = gateway_spn if gateway_url is not None: self.gateway_url = gateway_url if gcp_audience is not None: @@ -143,8 +162,14 @@ def __init__(self, access_id=None, access_key=None, access_type='access_key', ac self.k8s_auth_config_name = k8s_auth_config_name if k8s_service_account_token is not None: self.k8s_service_account_token = k8s_service_account_token + if kerberos_username is not None: + self.kerberos_username = kerberos_username if key_data is not None: self.key_data = key_data + if keytab_data is not None: + self.keytab_data = keytab_data + if krb5_conf_data is not None: + self.krb5_conf_data = krb5_conf_data if ldap_password is not None: self.ldap_password = ldap_password if ldap_username is not None: @@ -363,6 +388,52 @@ def debug(self, debug): self._debug = debug + @property + def disable_pafxfast(self): + """Gets the disable_pafxfast of this Auth. # noqa: E501 + + Disable the FAST negotiation in the Kerberos authentication method # noqa: E501 + + :return: The disable_pafxfast of this Auth. # noqa: E501 + :rtype: str + """ + return self._disable_pafxfast + + @disable_pafxfast.setter + def disable_pafxfast(self, disable_pafxfast): + """Sets the disable_pafxfast of this Auth. + + Disable the FAST negotiation in the Kerberos authentication method # noqa: E501 + + :param disable_pafxfast: The disable_pafxfast of this Auth. # noqa: E501 + :type: str + """ + + self._disable_pafxfast = disable_pafxfast + + @property + def gateway_spn(self): + """Gets the gateway_spn of this Auth. # noqa: E501 + + The service principal name of the gateway as registered in LDAP (i.e., HTTP/gateway) # noqa: E501 + + :return: The gateway_spn of this Auth. # noqa: E501 + :rtype: str + """ + return self._gateway_spn + + @gateway_spn.setter + def gateway_spn(self, gateway_spn): + """Sets the gateway_spn of this Auth. + + The service principal name of the gateway as registered in LDAP (i.e., HTTP/gateway) # noqa: E501 + + :param gateway_spn: The gateway_spn of this Auth. # noqa: E501 + :type: str + """ + + self._gateway_spn = gateway_spn + @property def gateway_url(self): """Gets the gateway_url of this Auth. # noqa: E501 @@ -501,6 +572,29 @@ def k8s_service_account_token(self, k8s_service_account_token): self._k8s_service_account_token = k8s_service_account_token + @property + def kerberos_username(self): + """Gets the kerberos_username of this Auth. # noqa: E501 + + TThe username for the entry within the keytab to authenticate via Kerberos # noqa: E501 + + :return: The kerberos_username of this Auth. # noqa: E501 + :rtype: str + """ + return self._kerberos_username + + @kerberos_username.setter + def kerberos_username(self, kerberos_username): + """Sets the kerberos_username of this Auth. + + TThe username for the entry within the keytab to authenticate via Kerberos # noqa: E501 + + :param kerberos_username: The kerberos_username of this Auth. # noqa: E501 + :type: str + """ + + self._kerberos_username = kerberos_username + @property def key_data(self): """Gets the key_data of this Auth. # noqa: E501 @@ -524,6 +618,52 @@ def key_data(self, key_data): self._key_data = key_data + @property + def keytab_data(self): + """Gets the keytab_data of this Auth. # noqa: E501 + + Base64-encoded content of a valid keytab file, containing the service account's entry. # noqa: E501 + + :return: The keytab_data of this Auth. # noqa: E501 + :rtype: str + """ + return self._keytab_data + + @keytab_data.setter + def keytab_data(self, keytab_data): + """Sets the keytab_data of this Auth. + + Base64-encoded content of a valid keytab file, containing the service account's entry. # noqa: E501 + + :param keytab_data: The keytab_data of this Auth. # noqa: E501 + :type: str + """ + + self._keytab_data = keytab_data + + @property + def krb5_conf_data(self): + """Gets the krb5_conf_data of this Auth. # noqa: E501 + + Base64-encoded content of a valid krb5.conf file, specifying the settings and parameters required for Kerberos authentication. # noqa: E501 + + :return: The krb5_conf_data of this Auth. # noqa: E501 + :rtype: str + """ + return self._krb5_conf_data + + @krb5_conf_data.setter + def krb5_conf_data(self, krb5_conf_data): + """Sets the krb5_conf_data of this Auth. + + Base64-encoded content of a valid krb5.conf file, specifying the settings and parameters required for Kerberos authentication. # noqa: E501 + + :param krb5_conf_data: The krb5_conf_data of this Auth. # noqa: E501 + :type: str + """ + + self._krb5_conf_data = krb5_conf_data + @property def ldap_password(self): """Gets the ldap_password of this Auth. # noqa: E501 diff --git a/akeyless/models/auth_method.py b/akeyless/models/auth_method.py index d41aeff7..2a77646c 100644 --- a/akeyless/models/auth_method.py +++ b/akeyless/models/auth_method.py @@ -40,6 +40,7 @@ class AuthMethod(object): 'account_id': 'str', 'associated_gw_ids': 'list[int]', 'auth_method_access_id': 'str', + 'auth_method_additional_data': 'AuthMethodAdditionalData', 'auth_method_name': 'str', 'auth_method_roles_assoc': 'list[AuthMethodRoleAssociation]', 'client_permissions': 'list[str]', @@ -57,6 +58,7 @@ class AuthMethod(object): 'account_id': 'account_id', 'associated_gw_ids': 'associated_gw_ids', 'auth_method_access_id': 'auth_method_access_id', + 'auth_method_additional_data': 'auth_method_additional_data', 'auth_method_name': 'auth_method_name', 'auth_method_roles_assoc': 'auth_method_roles_assoc', 'client_permissions': 'client_permissions', @@ -67,7 +69,7 @@ class AuthMethod(object): 'modification_date': 'modification_date' } - def __init__(self, access_date=None, access_date_display=None, access_info=None, account_id=None, associated_gw_ids=None, auth_method_access_id=None, auth_method_name=None, auth_method_roles_assoc=None, client_permissions=None, creation_date=None, delete_protection=None, description=None, is_approved=None, modification_date=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, access_date=None, access_date_display=None, access_info=None, account_id=None, associated_gw_ids=None, auth_method_access_id=None, auth_method_additional_data=None, auth_method_name=None, auth_method_roles_assoc=None, client_permissions=None, creation_date=None, delete_protection=None, description=None, is_approved=None, modification_date=None, local_vars_configuration=None): # noqa: E501 """AuthMethod - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -79,6 +81,7 @@ def __init__(self, access_date=None, access_date_display=None, access_info=None, self._account_id = None self._associated_gw_ids = None self._auth_method_access_id = None + self._auth_method_additional_data = None self._auth_method_name = None self._auth_method_roles_assoc = None self._client_permissions = None @@ -101,6 +104,8 @@ def __init__(self, access_date=None, access_date_display=None, access_info=None, self.associated_gw_ids = associated_gw_ids if auth_method_access_id is not None: self.auth_method_access_id = auth_method_access_id + if auth_method_additional_data is not None: + self.auth_method_additional_data = auth_method_additional_data if auth_method_name is not None: self.auth_method_name = auth_method_name if auth_method_roles_assoc is not None: @@ -244,6 +249,27 @@ def auth_method_access_id(self, auth_method_access_id): self._auth_method_access_id = auth_method_access_id + @property + def auth_method_additional_data(self): + """Gets the auth_method_additional_data of this AuthMethod. # noqa: E501 + + + :return: The auth_method_additional_data of this AuthMethod. # noqa: E501 + :rtype: AuthMethodAdditionalData + """ + return self._auth_method_additional_data + + @auth_method_additional_data.setter + def auth_method_additional_data(self, auth_method_additional_data): + """Sets the auth_method_additional_data of this AuthMethod. + + + :param auth_method_additional_data: The auth_method_additional_data of this AuthMethod. # noqa: E501 + :type: AuthMethodAdditionalData + """ + + self._auth_method_additional_data = auth_method_additional_data + @property def auth_method_name(self): """Gets the auth_method_name of this AuthMethod. # noqa: E501 diff --git a/akeyless/models/auth_method_access_info.py b/akeyless/models/auth_method_access_info.py index bcc8bd81..40ddfa83 100644 --- a/akeyless/models/auth_method_access_info.py +++ b/akeyless/models/auth_method_access_info.py @@ -49,6 +49,7 @@ class AuthMethodAccessInfo(object): 'huawei_access_rules': 'HuaweiAccessRules', 'jwt_ttl': 'int', 'k8s_access_rules': 'KubernetesAccessRules', + 'kerberos_access_rules': 'KerberosAccessRules', 'ldap_access_rules': 'LDAPAccessRules', 'oauth2_access_rules': 'OAuth2AccessRules', 'oci_access_rules': 'OCIAccessRules', @@ -76,6 +77,7 @@ class AuthMethodAccessInfo(object): 'huawei_access_rules': 'huawei_access_rules', 'jwt_ttl': 'jwt_ttl', 'k8s_access_rules': 'k8s_access_rules', + 'kerberos_access_rules': 'kerberos_access_rules', 'ldap_access_rules': 'ldap_access_rules', 'oauth2_access_rules': 'oauth2_access_rules', 'oci_access_rules': 'oci_access_rules', @@ -87,7 +89,7 @@ class AuthMethodAccessInfo(object): 'universal_identity_access_rules': 'universal_identity_access_rules' } - def __init__(self, access_expires=None, access_id_alias=None, api_key_access_rules=None, audit_logs_claims=None, aws_iam_access_rules=None, azure_ad_access_rules=None, cert_access_rules=None, cidr_whitelist=None, email_pass_access_rules=None, force_sub_claims=None, gcp_access_rules=None, gw_cidr_whitelist=None, huawei_access_rules=None, jwt_ttl=None, k8s_access_rules=None, ldap_access_rules=None, oauth2_access_rules=None, oci_access_rules=None, oidc_access_rules=None, product_types=None, rules_type=None, saml_access_rules=None, sub_claims_delimiters=None, universal_identity_access_rules=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, access_expires=None, access_id_alias=None, api_key_access_rules=None, audit_logs_claims=None, aws_iam_access_rules=None, azure_ad_access_rules=None, cert_access_rules=None, cidr_whitelist=None, email_pass_access_rules=None, force_sub_claims=None, gcp_access_rules=None, gw_cidr_whitelist=None, huawei_access_rules=None, jwt_ttl=None, k8s_access_rules=None, kerberos_access_rules=None, ldap_access_rules=None, oauth2_access_rules=None, oci_access_rules=None, oidc_access_rules=None, product_types=None, rules_type=None, saml_access_rules=None, sub_claims_delimiters=None, universal_identity_access_rules=None, local_vars_configuration=None): # noqa: E501 """AuthMethodAccessInfo - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -108,6 +110,7 @@ def __init__(self, access_expires=None, access_id_alias=None, api_key_access_rul self._huawei_access_rules = None self._jwt_ttl = None self._k8s_access_rules = None + self._kerberos_access_rules = None self._ldap_access_rules = None self._oauth2_access_rules = None self._oci_access_rules = None @@ -149,6 +152,8 @@ def __init__(self, access_expires=None, access_id_alias=None, api_key_access_rul self.jwt_ttl = jwt_ttl if k8s_access_rules is not None: self.k8s_access_rules = k8s_access_rules + if kerberos_access_rules is not None: + self.kerberos_access_rules = kerberos_access_rules if ldap_access_rules is not None: self.ldap_access_rules = ldap_access_rules if oauth2_access_rules is not None: @@ -487,6 +492,27 @@ def k8s_access_rules(self, k8s_access_rules): self._k8s_access_rules = k8s_access_rules + @property + def kerberos_access_rules(self): + """Gets the kerberos_access_rules of this AuthMethodAccessInfo. # noqa: E501 + + + :return: The kerberos_access_rules of this AuthMethodAccessInfo. # noqa: E501 + :rtype: KerberosAccessRules + """ + return self._kerberos_access_rules + + @kerberos_access_rules.setter + def kerberos_access_rules(self, kerberos_access_rules): + """Sets the kerberos_access_rules of this AuthMethodAccessInfo. + + + :param kerberos_access_rules: The kerberos_access_rules of this AuthMethodAccessInfo. # noqa: E501 + :type: KerberosAccessRules + """ + + self._kerberos_access_rules = kerberos_access_rules + @property def ldap_access_rules(self): """Gets the ldap_access_rules of this AuthMethodAccessInfo. # noqa: E501 diff --git a/akeyless/models/auth_method_additional_data.py b/akeyless/models/auth_method_additional_data.py new file mode 100644 index 00000000..3fccf6a9 --- /dev/null +++ b/akeyless/models/auth_method_additional_data.py @@ -0,0 +1,121 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class AuthMethodAdditionalData(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'kerberos_data': 'KerberosAuthMethodInfo' + } + + attribute_map = { + 'kerberos_data': 'kerberos_data' + } + + def __init__(self, kerberos_data=None, local_vars_configuration=None): # noqa: E501 + """AuthMethodAdditionalData - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._kerberos_data = None + self.discriminator = None + + if kerberos_data is not None: + self.kerberos_data = kerberos_data + + @property + def kerberos_data(self): + """Gets the kerberos_data of this AuthMethodAdditionalData. # noqa: E501 + + + :return: The kerberos_data of this AuthMethodAdditionalData. # noqa: E501 + :rtype: KerberosAuthMethodInfo + """ + return self._kerberos_data + + @kerberos_data.setter + def kerberos_data(self, kerberos_data): + """Sets the kerberos_data of this AuthMethodAdditionalData. + + + :param kerberos_data: The kerberos_data of this AuthMethodAdditionalData. # noqa: E501 + :type: KerberosAuthMethodInfo + """ + + self._kerberos_data = kerberos_data + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, AuthMethodAdditionalData): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, AuthMethodAdditionalData): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/auth_method_create_kerberos.py b/akeyless/models/auth_method_create_kerberos.py new file mode 100644 index 00000000..fcbd35a7 --- /dev/null +++ b/akeyless/models/auth_method_create_kerberos.py @@ -0,0 +1,880 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class AuthMethodCreateKerberos(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'access_expires': 'int', + 'audit_logs_claims': 'list[str]', + 'bind_dn': 'str', + 'bind_dn_password': 'str', + 'bound_ips': 'list[str]', + 'delete_protection': 'str', + 'description': 'str', + 'force_sub_claims': 'bool', + 'group_attr': 'str', + 'group_dn': 'str', + 'group_filter': 'str', + 'gw_bound_ips': 'list[str]', + 'json': 'bool', + 'jwt_ttl': 'int', + 'keytab_file_data': 'str', + 'keytab_file_path': 'str', + 'krb5_conf_data': 'str', + 'krb5_conf_path': 'str', + 'ldap_anonymous_search': 'bool', + 'ldap_ca_cert': 'str', + 'ldap_url': 'str', + 'name': 'str', + 'product_type': 'list[str]', + 'subclaims_delimiters': 'list[str]', + 'token': 'str', + 'uid_token': 'str', + 'unique_identifier': 'str', + 'user_attribute': 'str', + 'user_dn': 'str' + } + + attribute_map = { + 'access_expires': 'access-expires', + 'audit_logs_claims': 'audit-logs-claims', + 'bind_dn': 'bind-dn', + 'bind_dn_password': 'bind-dn-password', + 'bound_ips': 'bound-ips', + 'delete_protection': 'delete_protection', + 'description': 'description', + 'force_sub_claims': 'force-sub-claims', + 'group_attr': 'group-attr', + 'group_dn': 'group-dn', + 'group_filter': 'group-filter', + 'gw_bound_ips': 'gw-bound-ips', + 'json': 'json', + 'jwt_ttl': 'jwt-ttl', + 'keytab_file_data': 'keytab-file-data', + 'keytab_file_path': 'keytab-file-path', + 'krb5_conf_data': 'krb5-conf-data', + 'krb5_conf_path': 'krb5-conf-path', + 'ldap_anonymous_search': 'ldap-anonymous-search', + 'ldap_ca_cert': 'ldap-ca-cert', + 'ldap_url': 'ldap-url', + 'name': 'name', + 'product_type': 'product-type', + 'subclaims_delimiters': 'subclaims-delimiters', + 'token': 'token', + 'uid_token': 'uid-token', + 'unique_identifier': 'unique-identifier', + 'user_attribute': 'user-attribute', + 'user_dn': 'user-dn' + } + + def __init__(self, access_expires=0, audit_logs_claims=None, bind_dn=None, bind_dn_password=None, bound_ips=None, delete_protection=None, description=None, force_sub_claims=None, group_attr=None, group_dn=None, group_filter=None, gw_bound_ips=None, json=False, jwt_ttl=0, keytab_file_data=None, keytab_file_path=None, krb5_conf_data=None, krb5_conf_path=None, ldap_anonymous_search=None, ldap_ca_cert=None, ldap_url=None, name=None, product_type=None, subclaims_delimiters=None, token=None, uid_token=None, unique_identifier=None, user_attribute=None, user_dn=None, local_vars_configuration=None): # noqa: E501 + """AuthMethodCreateKerberos - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._access_expires = None + self._audit_logs_claims = None + self._bind_dn = None + self._bind_dn_password = None + self._bound_ips = None + self._delete_protection = None + self._description = None + self._force_sub_claims = None + self._group_attr = None + self._group_dn = None + self._group_filter = None + self._gw_bound_ips = None + self._json = None + self._jwt_ttl = None + self._keytab_file_data = None + self._keytab_file_path = None + self._krb5_conf_data = None + self._krb5_conf_path = None + self._ldap_anonymous_search = None + self._ldap_ca_cert = None + self._ldap_url = None + self._name = None + self._product_type = None + self._subclaims_delimiters = None + self._token = None + self._uid_token = None + self._unique_identifier = None + self._user_attribute = None + self._user_dn = None + self.discriminator = None + + if access_expires is not None: + self.access_expires = access_expires + if audit_logs_claims is not None: + self.audit_logs_claims = audit_logs_claims + if bind_dn is not None: + self.bind_dn = bind_dn + if bind_dn_password is not None: + self.bind_dn_password = bind_dn_password + if bound_ips is not None: + self.bound_ips = bound_ips + if delete_protection is not None: + self.delete_protection = delete_protection + if description is not None: + self.description = description + if force_sub_claims is not None: + self.force_sub_claims = force_sub_claims + if group_attr is not None: + self.group_attr = group_attr + if group_dn is not None: + self.group_dn = group_dn + if group_filter is not None: + self.group_filter = group_filter + if gw_bound_ips is not None: + self.gw_bound_ips = gw_bound_ips + if json is not None: + self.json = json + if jwt_ttl is not None: + self.jwt_ttl = jwt_ttl + if keytab_file_data is not None: + self.keytab_file_data = keytab_file_data + if keytab_file_path is not None: + self.keytab_file_path = keytab_file_path + if krb5_conf_data is not None: + self.krb5_conf_data = krb5_conf_data + if krb5_conf_path is not None: + self.krb5_conf_path = krb5_conf_path + if ldap_anonymous_search is not None: + self.ldap_anonymous_search = ldap_anonymous_search + if ldap_ca_cert is not None: + self.ldap_ca_cert = ldap_ca_cert + if ldap_url is not None: + self.ldap_url = ldap_url + self.name = name + if product_type is not None: + self.product_type = product_type + if subclaims_delimiters is not None: + self.subclaims_delimiters = subclaims_delimiters + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + if unique_identifier is not None: + self.unique_identifier = unique_identifier + if user_attribute is not None: + self.user_attribute = user_attribute + if user_dn is not None: + self.user_dn = user_dn + + @property + def access_expires(self): + """Gets the access_expires of this AuthMethodCreateKerberos. # noqa: E501 + + Access expiration date in Unix timestamp (select 0 for access without expiry date) # noqa: E501 + + :return: The access_expires of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: int + """ + return self._access_expires + + @access_expires.setter + def access_expires(self, access_expires): + """Sets the access_expires of this AuthMethodCreateKerberos. + + Access expiration date in Unix timestamp (select 0 for access without expiry date) # noqa: E501 + + :param access_expires: The access_expires of this AuthMethodCreateKerberos. # noqa: E501 + :type: int + """ + + self._access_expires = access_expires + + @property + def audit_logs_claims(self): + """Gets the audit_logs_claims of this AuthMethodCreateKerberos. # noqa: E501 + + Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" # noqa: E501 + + :return: The audit_logs_claims of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._audit_logs_claims + + @audit_logs_claims.setter + def audit_logs_claims(self, audit_logs_claims): + """Sets the audit_logs_claims of this AuthMethodCreateKerberos. + + Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" # noqa: E501 + + :param audit_logs_claims: The audit_logs_claims of this AuthMethodCreateKerberos. # noqa: E501 + :type: list[str] + """ + + self._audit_logs_claims = audit_logs_claims + + @property + def bind_dn(self): + """Gets the bind_dn of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The bind_dn of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._bind_dn + + @bind_dn.setter + def bind_dn(self, bind_dn): + """Sets the bind_dn of this AuthMethodCreateKerberos. + + + :param bind_dn: The bind_dn of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._bind_dn = bind_dn + + @property + def bind_dn_password(self): + """Gets the bind_dn_password of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The bind_dn_password of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._bind_dn_password + + @bind_dn_password.setter + def bind_dn_password(self, bind_dn_password): + """Sets the bind_dn_password of this AuthMethodCreateKerberos. + + + :param bind_dn_password: The bind_dn_password of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._bind_dn_password = bind_dn_password + + @property + def bound_ips(self): + """Gets the bound_ips of this AuthMethodCreateKerberos. # noqa: E501 + + A CIDR whitelist with the IPs that the access is restricted to # noqa: E501 + + :return: The bound_ips of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._bound_ips + + @bound_ips.setter + def bound_ips(self, bound_ips): + """Sets the bound_ips of this AuthMethodCreateKerberos. + + A CIDR whitelist with the IPs that the access is restricted to # noqa: E501 + + :param bound_ips: The bound_ips of this AuthMethodCreateKerberos. # noqa: E501 + :type: list[str] + """ + + self._bound_ips = bound_ips + + @property + def delete_protection(self): + """Gets the delete_protection of this AuthMethodCreateKerberos. # noqa: E501 + + Protection from accidental deletion of this object [true/false] # noqa: E501 + + :return: The delete_protection of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._delete_protection + + @delete_protection.setter + def delete_protection(self, delete_protection): + """Sets the delete_protection of this AuthMethodCreateKerberos. + + Protection from accidental deletion of this object [true/false] # noqa: E501 + + :param delete_protection: The delete_protection of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._delete_protection = delete_protection + + @property + def description(self): + """Gets the description of this AuthMethodCreateKerberos. # noqa: E501 + + Auth Method description # noqa: E501 + + :return: The description of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._description + + @description.setter + def description(self, description): + """Sets the description of this AuthMethodCreateKerberos. + + Auth Method description # noqa: E501 + + :param description: The description of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._description = description + + @property + def force_sub_claims(self): + """Gets the force_sub_claims of this AuthMethodCreateKerberos. # noqa: E501 + + if true: enforce role-association must include sub claims # noqa: E501 + + :return: The force_sub_claims of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: bool + """ + return self._force_sub_claims + + @force_sub_claims.setter + def force_sub_claims(self, force_sub_claims): + """Sets the force_sub_claims of this AuthMethodCreateKerberos. + + if true: enforce role-association must include sub claims # noqa: E501 + + :param force_sub_claims: The force_sub_claims of this AuthMethodCreateKerberos. # noqa: E501 + :type: bool + """ + + self._force_sub_claims = force_sub_claims + + @property + def group_attr(self): + """Gets the group_attr of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The group_attr of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._group_attr + + @group_attr.setter + def group_attr(self, group_attr): + """Sets the group_attr of this AuthMethodCreateKerberos. + + + :param group_attr: The group_attr of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._group_attr = group_attr + + @property + def group_dn(self): + """Gets the group_dn of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The group_dn of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._group_dn + + @group_dn.setter + def group_dn(self, group_dn): + """Sets the group_dn of this AuthMethodCreateKerberos. + + + :param group_dn: The group_dn of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._group_dn = group_dn + + @property + def group_filter(self): + """Gets the group_filter of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The group_filter of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._group_filter + + @group_filter.setter + def group_filter(self, group_filter): + """Sets the group_filter of this AuthMethodCreateKerberos. + + + :param group_filter: The group_filter of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._group_filter = group_filter + + @property + def gw_bound_ips(self): + """Gets the gw_bound_ips of this AuthMethodCreateKerberos. # noqa: E501 + + A CIDR whitelist with the GW IPs that the access is restricted to # noqa: E501 + + :return: The gw_bound_ips of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._gw_bound_ips + + @gw_bound_ips.setter + def gw_bound_ips(self, gw_bound_ips): + """Sets the gw_bound_ips of this AuthMethodCreateKerberos. + + A CIDR whitelist with the GW IPs that the access is restricted to # noqa: E501 + + :param gw_bound_ips: The gw_bound_ips of this AuthMethodCreateKerberos. # noqa: E501 + :type: list[str] + """ + + self._gw_bound_ips = gw_bound_ips + + @property + def json(self): + """Gets the json of this AuthMethodCreateKerberos. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this AuthMethodCreateKerberos. + + Set output format to JSON # noqa: E501 + + :param json: The json of this AuthMethodCreateKerberos. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def jwt_ttl(self): + """Gets the jwt_ttl of this AuthMethodCreateKerberos. # noqa: E501 + + Jwt TTL # noqa: E501 + + :return: The jwt_ttl of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: int + """ + return self._jwt_ttl + + @jwt_ttl.setter + def jwt_ttl(self, jwt_ttl): + """Sets the jwt_ttl of this AuthMethodCreateKerberos. + + Jwt TTL # noqa: E501 + + :param jwt_ttl: The jwt_ttl of this AuthMethodCreateKerberos. # noqa: E501 + :type: int + """ + + self._jwt_ttl = jwt_ttl + + @property + def keytab_file_data(self): + """Gets the keytab_file_data of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The keytab_file_data of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._keytab_file_data + + @keytab_file_data.setter + def keytab_file_data(self, keytab_file_data): + """Sets the keytab_file_data of this AuthMethodCreateKerberos. + + + :param keytab_file_data: The keytab_file_data of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._keytab_file_data = keytab_file_data + + @property + def keytab_file_path(self): + """Gets the keytab_file_path of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The keytab_file_path of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._keytab_file_path + + @keytab_file_path.setter + def keytab_file_path(self, keytab_file_path): + """Sets the keytab_file_path of this AuthMethodCreateKerberos. + + + :param keytab_file_path: The keytab_file_path of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._keytab_file_path = keytab_file_path + + @property + def krb5_conf_data(self): + """Gets the krb5_conf_data of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The krb5_conf_data of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._krb5_conf_data + + @krb5_conf_data.setter + def krb5_conf_data(self, krb5_conf_data): + """Sets the krb5_conf_data of this AuthMethodCreateKerberos. + + + :param krb5_conf_data: The krb5_conf_data of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._krb5_conf_data = krb5_conf_data + + @property + def krb5_conf_path(self): + """Gets the krb5_conf_path of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The krb5_conf_path of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._krb5_conf_path + + @krb5_conf_path.setter + def krb5_conf_path(self, krb5_conf_path): + """Sets the krb5_conf_path of this AuthMethodCreateKerberos. + + + :param krb5_conf_path: The krb5_conf_path of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._krb5_conf_path = krb5_conf_path + + @property + def ldap_anonymous_search(self): + """Gets the ldap_anonymous_search of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The ldap_anonymous_search of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: bool + """ + return self._ldap_anonymous_search + + @ldap_anonymous_search.setter + def ldap_anonymous_search(self, ldap_anonymous_search): + """Sets the ldap_anonymous_search of this AuthMethodCreateKerberos. + + + :param ldap_anonymous_search: The ldap_anonymous_search of this AuthMethodCreateKerberos. # noqa: E501 + :type: bool + """ + + self._ldap_anonymous_search = ldap_anonymous_search + + @property + def ldap_ca_cert(self): + """Gets the ldap_ca_cert of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The ldap_ca_cert of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._ldap_ca_cert + + @ldap_ca_cert.setter + def ldap_ca_cert(self, ldap_ca_cert): + """Sets the ldap_ca_cert of this AuthMethodCreateKerberos. + + + :param ldap_ca_cert: The ldap_ca_cert of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._ldap_ca_cert = ldap_ca_cert + + @property + def ldap_url(self): + """Gets the ldap_url of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The ldap_url of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._ldap_url + + @ldap_url.setter + def ldap_url(self, ldap_url): + """Sets the ldap_url of this AuthMethodCreateKerberos. + + + :param ldap_url: The ldap_url of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._ldap_url = ldap_url + + @property + def name(self): + """Gets the name of this AuthMethodCreateKerberos. # noqa: E501 + + Auth Method name # noqa: E501 + + :return: The name of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._name + + @name.setter + def name(self, name): + """Sets the name of this AuthMethodCreateKerberos. + + Auth Method name # noqa: E501 + + :param name: The name of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and name is None: # noqa: E501 + raise ValueError("Invalid value for `name`, must not be `None`") # noqa: E501 + + self._name = name + + @property + def product_type(self): + """Gets the product_type of this AuthMethodCreateKerberos. # noqa: E501 + + Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] # noqa: E501 + + :return: The product_type of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._product_type + + @product_type.setter + def product_type(self, product_type): + """Sets the product_type of this AuthMethodCreateKerberos. + + Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] # noqa: E501 + + :param product_type: The product_type of this AuthMethodCreateKerberos. # noqa: E501 + :type: list[str] + """ + + self._product_type = product_type + + @property + def subclaims_delimiters(self): + """Gets the subclaims_delimiters of this AuthMethodCreateKerberos. # noqa: E501 + + A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) # noqa: E501 + + :return: The subclaims_delimiters of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._subclaims_delimiters + + @subclaims_delimiters.setter + def subclaims_delimiters(self, subclaims_delimiters): + """Sets the subclaims_delimiters of this AuthMethodCreateKerberos. + + A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) # noqa: E501 + + :param subclaims_delimiters: The subclaims_delimiters of this AuthMethodCreateKerberos. # noqa: E501 + :type: list[str] + """ + + self._subclaims_delimiters = subclaims_delimiters + + @property + def token(self): + """Gets the token of this AuthMethodCreateKerberos. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this AuthMethodCreateKerberos. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this AuthMethodCreateKerberos. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this AuthMethodCreateKerberos. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + @property + def unique_identifier(self): + """Gets the unique_identifier of this AuthMethodCreateKerberos. # noqa: E501 + + A unique identifier (ID) value which is a \"sub claim\" name that contains details uniquely identifying that resource. This \"sub claim\" is used to distinguish between different identities. # noqa: E501 + + :return: The unique_identifier of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._unique_identifier + + @unique_identifier.setter + def unique_identifier(self, unique_identifier): + """Sets the unique_identifier of this AuthMethodCreateKerberos. + + A unique identifier (ID) value which is a \"sub claim\" name that contains details uniquely identifying that resource. This \"sub claim\" is used to distinguish between different identities. # noqa: E501 + + :param unique_identifier: The unique_identifier of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._unique_identifier = unique_identifier + + @property + def user_attribute(self): + """Gets the user_attribute of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The user_attribute of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._user_attribute + + @user_attribute.setter + def user_attribute(self, user_attribute): + """Sets the user_attribute of this AuthMethodCreateKerberos. + + + :param user_attribute: The user_attribute of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._user_attribute = user_attribute + + @property + def user_dn(self): + """Gets the user_dn of this AuthMethodCreateKerberos. # noqa: E501 + + + :return: The user_dn of this AuthMethodCreateKerberos. # noqa: E501 + :rtype: str + """ + return self._user_dn + + @user_dn.setter + def user_dn(self, user_dn): + """Sets the user_dn of this AuthMethodCreateKerberos. + + + :param user_dn: The user_dn of this AuthMethodCreateKerberos. # noqa: E501 + :type: str + """ + + self._user_dn = user_dn + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, AuthMethodCreateKerberos): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, AuthMethodCreateKerberos): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/auth_method_update_kerberos.py b/akeyless/models/auth_method_update_kerberos.py new file mode 100644 index 00000000..f4b49292 --- /dev/null +++ b/akeyless/models/auth_method_update_kerberos.py @@ -0,0 +1,906 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class AuthMethodUpdateKerberos(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'access_expires': 'int', + 'audit_logs_claims': 'list[str]', + 'bind_dn': 'str', + 'bind_dn_password': 'str', + 'bound_ips': 'list[str]', + 'delete_protection': 'str', + 'description': 'str', + 'force_sub_claims': 'bool', + 'group_attr': 'str', + 'group_dn': 'str', + 'group_filter': 'str', + 'gw_bound_ips': 'list[str]', + 'json': 'bool', + 'jwt_ttl': 'int', + 'keytab_file_data': 'str', + 'keytab_file_path': 'str', + 'krb5_conf_data': 'str', + 'krb5_conf_path': 'str', + 'ldap_anonymous_search': 'bool', + 'ldap_ca_cert': 'str', + 'ldap_url': 'str', + 'name': 'str', + 'new_name': 'str', + 'product_type': 'list[str]', + 'subclaims_delimiters': 'list[str]', + 'token': 'str', + 'uid_token': 'str', + 'unique_identifier': 'str', + 'user_attribute': 'str', + 'user_dn': 'str' + } + + attribute_map = { + 'access_expires': 'access-expires', + 'audit_logs_claims': 'audit-logs-claims', + 'bind_dn': 'bind-dn', + 'bind_dn_password': 'bind-dn-password', + 'bound_ips': 'bound-ips', + 'delete_protection': 'delete_protection', + 'description': 'description', + 'force_sub_claims': 'force-sub-claims', + 'group_attr': 'group-attr', + 'group_dn': 'group-dn', + 'group_filter': 'group-filter', + 'gw_bound_ips': 'gw-bound-ips', + 'json': 'json', + 'jwt_ttl': 'jwt-ttl', + 'keytab_file_data': 'keytab-file-data', + 'keytab_file_path': 'keytab-file-path', + 'krb5_conf_data': 'krb5-conf-data', + 'krb5_conf_path': 'krb5-conf-path', + 'ldap_anonymous_search': 'ldap-anonymous-search', + 'ldap_ca_cert': 'ldap-ca-cert', + 'ldap_url': 'ldap-url', + 'name': 'name', + 'new_name': 'new-name', + 'product_type': 'product-type', + 'subclaims_delimiters': 'subclaims-delimiters', + 'token': 'token', + 'uid_token': 'uid-token', + 'unique_identifier': 'unique-identifier', + 'user_attribute': 'user-attribute', + 'user_dn': 'user-dn' + } + + def __init__(self, access_expires=0, audit_logs_claims=None, bind_dn=None, bind_dn_password=None, bound_ips=None, delete_protection=None, description=None, force_sub_claims=None, group_attr=None, group_dn=None, group_filter=None, gw_bound_ips=None, json=False, jwt_ttl=0, keytab_file_data=None, keytab_file_path=None, krb5_conf_data=None, krb5_conf_path=None, ldap_anonymous_search=None, ldap_ca_cert=None, ldap_url=None, name=None, new_name=None, product_type=None, subclaims_delimiters=None, token=None, uid_token=None, unique_identifier=None, user_attribute=None, user_dn=None, local_vars_configuration=None): # noqa: E501 + """AuthMethodUpdateKerberos - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._access_expires = None + self._audit_logs_claims = None + self._bind_dn = None + self._bind_dn_password = None + self._bound_ips = None + self._delete_protection = None + self._description = None + self._force_sub_claims = None + self._group_attr = None + self._group_dn = None + self._group_filter = None + self._gw_bound_ips = None + self._json = None + self._jwt_ttl = None + self._keytab_file_data = None + self._keytab_file_path = None + self._krb5_conf_data = None + self._krb5_conf_path = None + self._ldap_anonymous_search = None + self._ldap_ca_cert = None + self._ldap_url = None + self._name = None + self._new_name = None + self._product_type = None + self._subclaims_delimiters = None + self._token = None + self._uid_token = None + self._unique_identifier = None + self._user_attribute = None + self._user_dn = None + self.discriminator = None + + if access_expires is not None: + self.access_expires = access_expires + if audit_logs_claims is not None: + self.audit_logs_claims = audit_logs_claims + if bind_dn is not None: + self.bind_dn = bind_dn + if bind_dn_password is not None: + self.bind_dn_password = bind_dn_password + if bound_ips is not None: + self.bound_ips = bound_ips + if delete_protection is not None: + self.delete_protection = delete_protection + if description is not None: + self.description = description + if force_sub_claims is not None: + self.force_sub_claims = force_sub_claims + if group_attr is not None: + self.group_attr = group_attr + if group_dn is not None: + self.group_dn = group_dn + if group_filter is not None: + self.group_filter = group_filter + if gw_bound_ips is not None: + self.gw_bound_ips = gw_bound_ips + if json is not None: + self.json = json + if jwt_ttl is not None: + self.jwt_ttl = jwt_ttl + if keytab_file_data is not None: + self.keytab_file_data = keytab_file_data + if keytab_file_path is not None: + self.keytab_file_path = keytab_file_path + if krb5_conf_data is not None: + self.krb5_conf_data = krb5_conf_data + if krb5_conf_path is not None: + self.krb5_conf_path = krb5_conf_path + if ldap_anonymous_search is not None: + self.ldap_anonymous_search = ldap_anonymous_search + if ldap_ca_cert is not None: + self.ldap_ca_cert = ldap_ca_cert + if ldap_url is not None: + self.ldap_url = ldap_url + self.name = name + if new_name is not None: + self.new_name = new_name + if product_type is not None: + self.product_type = product_type + if subclaims_delimiters is not None: + self.subclaims_delimiters = subclaims_delimiters + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + if unique_identifier is not None: + self.unique_identifier = unique_identifier + if user_attribute is not None: + self.user_attribute = user_attribute + if user_dn is not None: + self.user_dn = user_dn + + @property + def access_expires(self): + """Gets the access_expires of this AuthMethodUpdateKerberos. # noqa: E501 + + Access expiration date in Unix timestamp (select 0 for access without expiry date) # noqa: E501 + + :return: The access_expires of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: int + """ + return self._access_expires + + @access_expires.setter + def access_expires(self, access_expires): + """Sets the access_expires of this AuthMethodUpdateKerberos. + + Access expiration date in Unix timestamp (select 0 for access without expiry date) # noqa: E501 + + :param access_expires: The access_expires of this AuthMethodUpdateKerberos. # noqa: E501 + :type: int + """ + + self._access_expires = access_expires + + @property + def audit_logs_claims(self): + """Gets the audit_logs_claims of this AuthMethodUpdateKerberos. # noqa: E501 + + Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" # noqa: E501 + + :return: The audit_logs_claims of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._audit_logs_claims + + @audit_logs_claims.setter + def audit_logs_claims(self, audit_logs_claims): + """Sets the audit_logs_claims of this AuthMethodUpdateKerberos. + + Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" # noqa: E501 + + :param audit_logs_claims: The audit_logs_claims of this AuthMethodUpdateKerberos. # noqa: E501 + :type: list[str] + """ + + self._audit_logs_claims = audit_logs_claims + + @property + def bind_dn(self): + """Gets the bind_dn of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The bind_dn of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._bind_dn + + @bind_dn.setter + def bind_dn(self, bind_dn): + """Sets the bind_dn of this AuthMethodUpdateKerberos. + + + :param bind_dn: The bind_dn of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._bind_dn = bind_dn + + @property + def bind_dn_password(self): + """Gets the bind_dn_password of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The bind_dn_password of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._bind_dn_password + + @bind_dn_password.setter + def bind_dn_password(self, bind_dn_password): + """Sets the bind_dn_password of this AuthMethodUpdateKerberos. + + + :param bind_dn_password: The bind_dn_password of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._bind_dn_password = bind_dn_password + + @property + def bound_ips(self): + """Gets the bound_ips of this AuthMethodUpdateKerberos. # noqa: E501 + + A CIDR whitelist with the IPs that the access is restricted to # noqa: E501 + + :return: The bound_ips of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._bound_ips + + @bound_ips.setter + def bound_ips(self, bound_ips): + """Sets the bound_ips of this AuthMethodUpdateKerberos. + + A CIDR whitelist with the IPs that the access is restricted to # noqa: E501 + + :param bound_ips: The bound_ips of this AuthMethodUpdateKerberos. # noqa: E501 + :type: list[str] + """ + + self._bound_ips = bound_ips + + @property + def delete_protection(self): + """Gets the delete_protection of this AuthMethodUpdateKerberos. # noqa: E501 + + Protection from accidental deletion of this object [true/false] # noqa: E501 + + :return: The delete_protection of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._delete_protection + + @delete_protection.setter + def delete_protection(self, delete_protection): + """Sets the delete_protection of this AuthMethodUpdateKerberos. + + Protection from accidental deletion of this object [true/false] # noqa: E501 + + :param delete_protection: The delete_protection of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._delete_protection = delete_protection + + @property + def description(self): + """Gets the description of this AuthMethodUpdateKerberos. # noqa: E501 + + Auth Method description # noqa: E501 + + :return: The description of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._description + + @description.setter + def description(self, description): + """Sets the description of this AuthMethodUpdateKerberos. + + Auth Method description # noqa: E501 + + :param description: The description of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._description = description + + @property + def force_sub_claims(self): + """Gets the force_sub_claims of this AuthMethodUpdateKerberos. # noqa: E501 + + if true: enforce role-association must include sub claims # noqa: E501 + + :return: The force_sub_claims of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: bool + """ + return self._force_sub_claims + + @force_sub_claims.setter + def force_sub_claims(self, force_sub_claims): + """Sets the force_sub_claims of this AuthMethodUpdateKerberos. + + if true: enforce role-association must include sub claims # noqa: E501 + + :param force_sub_claims: The force_sub_claims of this AuthMethodUpdateKerberos. # noqa: E501 + :type: bool + """ + + self._force_sub_claims = force_sub_claims + + @property + def group_attr(self): + """Gets the group_attr of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The group_attr of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._group_attr + + @group_attr.setter + def group_attr(self, group_attr): + """Sets the group_attr of this AuthMethodUpdateKerberos. + + + :param group_attr: The group_attr of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._group_attr = group_attr + + @property + def group_dn(self): + """Gets the group_dn of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The group_dn of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._group_dn + + @group_dn.setter + def group_dn(self, group_dn): + """Sets the group_dn of this AuthMethodUpdateKerberos. + + + :param group_dn: The group_dn of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._group_dn = group_dn + + @property + def group_filter(self): + """Gets the group_filter of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The group_filter of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._group_filter + + @group_filter.setter + def group_filter(self, group_filter): + """Sets the group_filter of this AuthMethodUpdateKerberos. + + + :param group_filter: The group_filter of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._group_filter = group_filter + + @property + def gw_bound_ips(self): + """Gets the gw_bound_ips of this AuthMethodUpdateKerberos. # noqa: E501 + + A CIDR whitelist with the GW IPs that the access is restricted to # noqa: E501 + + :return: The gw_bound_ips of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._gw_bound_ips + + @gw_bound_ips.setter + def gw_bound_ips(self, gw_bound_ips): + """Sets the gw_bound_ips of this AuthMethodUpdateKerberos. + + A CIDR whitelist with the GW IPs that the access is restricted to # noqa: E501 + + :param gw_bound_ips: The gw_bound_ips of this AuthMethodUpdateKerberos. # noqa: E501 + :type: list[str] + """ + + self._gw_bound_ips = gw_bound_ips + + @property + def json(self): + """Gets the json of this AuthMethodUpdateKerberos. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this AuthMethodUpdateKerberos. + + Set output format to JSON # noqa: E501 + + :param json: The json of this AuthMethodUpdateKerberos. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def jwt_ttl(self): + """Gets the jwt_ttl of this AuthMethodUpdateKerberos. # noqa: E501 + + Jwt TTL # noqa: E501 + + :return: The jwt_ttl of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: int + """ + return self._jwt_ttl + + @jwt_ttl.setter + def jwt_ttl(self, jwt_ttl): + """Sets the jwt_ttl of this AuthMethodUpdateKerberos. + + Jwt TTL # noqa: E501 + + :param jwt_ttl: The jwt_ttl of this AuthMethodUpdateKerberos. # noqa: E501 + :type: int + """ + + self._jwt_ttl = jwt_ttl + + @property + def keytab_file_data(self): + """Gets the keytab_file_data of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The keytab_file_data of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._keytab_file_data + + @keytab_file_data.setter + def keytab_file_data(self, keytab_file_data): + """Sets the keytab_file_data of this AuthMethodUpdateKerberos. + + + :param keytab_file_data: The keytab_file_data of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._keytab_file_data = keytab_file_data + + @property + def keytab_file_path(self): + """Gets the keytab_file_path of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The keytab_file_path of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._keytab_file_path + + @keytab_file_path.setter + def keytab_file_path(self, keytab_file_path): + """Sets the keytab_file_path of this AuthMethodUpdateKerberos. + + + :param keytab_file_path: The keytab_file_path of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._keytab_file_path = keytab_file_path + + @property + def krb5_conf_data(self): + """Gets the krb5_conf_data of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The krb5_conf_data of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._krb5_conf_data + + @krb5_conf_data.setter + def krb5_conf_data(self, krb5_conf_data): + """Sets the krb5_conf_data of this AuthMethodUpdateKerberos. + + + :param krb5_conf_data: The krb5_conf_data of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._krb5_conf_data = krb5_conf_data + + @property + def krb5_conf_path(self): + """Gets the krb5_conf_path of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The krb5_conf_path of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._krb5_conf_path + + @krb5_conf_path.setter + def krb5_conf_path(self, krb5_conf_path): + """Sets the krb5_conf_path of this AuthMethodUpdateKerberos. + + + :param krb5_conf_path: The krb5_conf_path of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._krb5_conf_path = krb5_conf_path + + @property + def ldap_anonymous_search(self): + """Gets the ldap_anonymous_search of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The ldap_anonymous_search of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: bool + """ + return self._ldap_anonymous_search + + @ldap_anonymous_search.setter + def ldap_anonymous_search(self, ldap_anonymous_search): + """Sets the ldap_anonymous_search of this AuthMethodUpdateKerberos. + + + :param ldap_anonymous_search: The ldap_anonymous_search of this AuthMethodUpdateKerberos. # noqa: E501 + :type: bool + """ + + self._ldap_anonymous_search = ldap_anonymous_search + + @property + def ldap_ca_cert(self): + """Gets the ldap_ca_cert of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The ldap_ca_cert of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._ldap_ca_cert + + @ldap_ca_cert.setter + def ldap_ca_cert(self, ldap_ca_cert): + """Sets the ldap_ca_cert of this AuthMethodUpdateKerberos. + + + :param ldap_ca_cert: The ldap_ca_cert of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._ldap_ca_cert = ldap_ca_cert + + @property + def ldap_url(self): + """Gets the ldap_url of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The ldap_url of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._ldap_url + + @ldap_url.setter + def ldap_url(self, ldap_url): + """Sets the ldap_url of this AuthMethodUpdateKerberos. + + + :param ldap_url: The ldap_url of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._ldap_url = ldap_url + + @property + def name(self): + """Gets the name of this AuthMethodUpdateKerberos. # noqa: E501 + + Auth Method name # noqa: E501 + + :return: The name of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._name + + @name.setter + def name(self, name): + """Sets the name of this AuthMethodUpdateKerberos. + + Auth Method name # noqa: E501 + + :param name: The name of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and name is None: # noqa: E501 + raise ValueError("Invalid value for `name`, must not be `None`") # noqa: E501 + + self._name = name + + @property + def new_name(self): + """Gets the new_name of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The new_name of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._new_name + + @new_name.setter + def new_name(self, new_name): + """Sets the new_name of this AuthMethodUpdateKerberos. + + + :param new_name: The new_name of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._new_name = new_name + + @property + def product_type(self): + """Gets the product_type of this AuthMethodUpdateKerberos. # noqa: E501 + + Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] # noqa: E501 + + :return: The product_type of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._product_type + + @product_type.setter + def product_type(self, product_type): + """Sets the product_type of this AuthMethodUpdateKerberos. + + Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] # noqa: E501 + + :param product_type: The product_type of this AuthMethodUpdateKerberos. # noqa: E501 + :type: list[str] + """ + + self._product_type = product_type + + @property + def subclaims_delimiters(self): + """Gets the subclaims_delimiters of this AuthMethodUpdateKerberos. # noqa: E501 + + A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) # noqa: E501 + + :return: The subclaims_delimiters of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: list[str] + """ + return self._subclaims_delimiters + + @subclaims_delimiters.setter + def subclaims_delimiters(self, subclaims_delimiters): + """Sets the subclaims_delimiters of this AuthMethodUpdateKerberos. + + A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) # noqa: E501 + + :param subclaims_delimiters: The subclaims_delimiters of this AuthMethodUpdateKerberos. # noqa: E501 + :type: list[str] + """ + + self._subclaims_delimiters = subclaims_delimiters + + @property + def token(self): + """Gets the token of this AuthMethodUpdateKerberos. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this AuthMethodUpdateKerberos. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this AuthMethodUpdateKerberos. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this AuthMethodUpdateKerberos. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + @property + def unique_identifier(self): + """Gets the unique_identifier of this AuthMethodUpdateKerberos. # noqa: E501 + + A unique identifier (ID) value which is a \"sub claim\" name that contains details uniquely identifying that resource. This \"sub claim\" is used to distinguish between different identities. # noqa: E501 + + :return: The unique_identifier of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._unique_identifier + + @unique_identifier.setter + def unique_identifier(self, unique_identifier): + """Sets the unique_identifier of this AuthMethodUpdateKerberos. + + A unique identifier (ID) value which is a \"sub claim\" name that contains details uniquely identifying that resource. This \"sub claim\" is used to distinguish between different identities. # noqa: E501 + + :param unique_identifier: The unique_identifier of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._unique_identifier = unique_identifier + + @property + def user_attribute(self): + """Gets the user_attribute of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The user_attribute of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._user_attribute + + @user_attribute.setter + def user_attribute(self, user_attribute): + """Sets the user_attribute of this AuthMethodUpdateKerberos. + + + :param user_attribute: The user_attribute of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._user_attribute = user_attribute + + @property + def user_dn(self): + """Gets the user_dn of this AuthMethodUpdateKerberos. # noqa: E501 + + + :return: The user_dn of this AuthMethodUpdateKerberos. # noqa: E501 + :rtype: str + """ + return self._user_dn + + @user_dn.setter + def user_dn(self, user_dn): + """Sets the user_dn of this AuthMethodUpdateKerberos. + + + :param user_dn: The user_dn of this AuthMethodUpdateKerberos. # noqa: E501 + :type: str + """ + + self._user_dn = user_dn + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, AuthMethodUpdateKerberos): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, AuthMethodUpdateKerberos): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/cache_config_part.py b/akeyless/models/cache_config_part.py index c51e918c..97667f45 100644 --- a/akeyless/models/cache_config_part.py +++ b/akeyless/models/cache_config_part.py @@ -35,6 +35,7 @@ class CacheConfigPart(object): """ openapi_types = { 'cache_enable': 'bool', + 'cache_encryption_key': 'str', 'cache_ttl': 'str', 'new_proactive_cache_enable': 'bool', 'proactive_cache_dump_interval': 'str', @@ -44,6 +45,7 @@ class CacheConfigPart(object): attribute_map = { 'cache_enable': 'cache_enable', + 'cache_encryption_key': 'cache_encryption_key', 'cache_ttl': 'cache_ttl', 'new_proactive_cache_enable': 'new_proactive_cache_enable', 'proactive_cache_dump_interval': 'proactive_cache_dump_interval', @@ -51,13 +53,14 @@ class CacheConfigPart(object): 'proactive_cache_minimum_fetching_time': 'proactive_cache_minimum_fetching_time' } - def __init__(self, cache_enable=None, cache_ttl=None, new_proactive_cache_enable=None, proactive_cache_dump_interval=None, proactive_cache_enable=None, proactive_cache_minimum_fetching_time=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, cache_enable=None, cache_encryption_key=None, cache_ttl=None, new_proactive_cache_enable=None, proactive_cache_dump_interval=None, proactive_cache_enable=None, proactive_cache_minimum_fetching_time=None, local_vars_configuration=None): # noqa: E501 """CacheConfigPart - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() self.local_vars_configuration = local_vars_configuration self._cache_enable = None + self._cache_encryption_key = None self._cache_ttl = None self._new_proactive_cache_enable = None self._proactive_cache_dump_interval = None @@ -67,6 +70,8 @@ def __init__(self, cache_enable=None, cache_ttl=None, new_proactive_cache_enable if cache_enable is not None: self.cache_enable = cache_enable + if cache_encryption_key is not None: + self.cache_encryption_key = cache_encryption_key if cache_ttl is not None: self.cache_ttl = cache_ttl if new_proactive_cache_enable is not None: @@ -99,6 +104,27 @@ def cache_enable(self, cache_enable): self._cache_enable = cache_enable + @property + def cache_encryption_key(self): + """Gets the cache_encryption_key of this CacheConfigPart. # noqa: E501 + + + :return: The cache_encryption_key of this CacheConfigPart. # noqa: E501 + :rtype: str + """ + return self._cache_encryption_key + + @cache_encryption_key.setter + def cache_encryption_key(self, cache_encryption_key): + """Sets the cache_encryption_key of this CacheConfigPart. + + + :param cache_encryption_key: The cache_encryption_key of this CacheConfigPart. # noqa: E501 + :type: str + """ + + self._cache_encryption_key = cache_encryption_key + @property def cache_ttl(self): """Gets the cache_ttl of this CacheConfigPart. # noqa: E501 diff --git a/akeyless/models/certificate_chain_info.py b/akeyless/models/certificate_chain_info.py index d38f4cb1..43d4b6cc 100644 --- a/akeyless/models/certificate_chain_info.py +++ b/akeyless/models/certificate_chain_info.py @@ -34,6 +34,7 @@ class CertificateChainInfo(object): and the value is json key in definition. """ openapi_types = { + 'auto_renew_certificate': 'bool', 'certificate_chain': 'list[CertificateInfo]', 'certificate_format': 'str', 'certificate_has_private_key': 'bool', @@ -42,10 +43,13 @@ class CertificateChainInfo(object): 'certificate_issuer_name': 'str', 'certificate_pem': 'str', 'certificate_status': 'str', - 'expiration_events': 'list[CertificateExpirationEvent]' + 'error_message': 'str', + 'expiration_events': 'list[CertificateExpirationEvent]', + 'renew_before_expiration_in_days': 'int' } attribute_map = { + 'auto_renew_certificate': 'auto_renew_certificate', 'certificate_chain': 'certificate_chain', 'certificate_format': 'certificate_format', 'certificate_has_private_key': 'certificate_has_private_key', @@ -54,15 +58,18 @@ class CertificateChainInfo(object): 'certificate_issuer_name': 'certificate_issuer_name', 'certificate_pem': 'certificate_pem', 'certificate_status': 'certificate_status', - 'expiration_events': 'expiration_events' + 'error_message': 'error_message', + 'expiration_events': 'expiration_events', + 'renew_before_expiration_in_days': 'renew_before_expiration_in_days' } - def __init__(self, certificate_chain=None, certificate_format=None, certificate_has_private_key=None, certificate_issuer_gw_cluster_url=None, certificate_issuer_item_id=None, certificate_issuer_name=None, certificate_pem=None, certificate_status=None, expiration_events=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, auto_renew_certificate=None, certificate_chain=None, certificate_format=None, certificate_has_private_key=None, certificate_issuer_gw_cluster_url=None, certificate_issuer_item_id=None, certificate_issuer_name=None, certificate_pem=None, certificate_status=None, error_message=None, expiration_events=None, renew_before_expiration_in_days=None, local_vars_configuration=None): # noqa: E501 """CertificateChainInfo - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() self.local_vars_configuration = local_vars_configuration + self._auto_renew_certificate = None self._certificate_chain = None self._certificate_format = None self._certificate_has_private_key = None @@ -71,9 +78,13 @@ def __init__(self, certificate_chain=None, certificate_format=None, certificate_ self._certificate_issuer_name = None self._certificate_pem = None self._certificate_status = None + self._error_message = None self._expiration_events = None + self._renew_before_expiration_in_days = None self.discriminator = None + if auto_renew_certificate is not None: + self.auto_renew_certificate = auto_renew_certificate if certificate_chain is not None: self.certificate_chain = certificate_chain if certificate_format is not None: @@ -90,8 +101,33 @@ def __init__(self, certificate_chain=None, certificate_format=None, certificate_ self.certificate_pem = certificate_pem if certificate_status is not None: self.certificate_status = certificate_status + if error_message is not None: + self.error_message = error_message if expiration_events is not None: self.expiration_events = expiration_events + if renew_before_expiration_in_days is not None: + self.renew_before_expiration_in_days = renew_before_expiration_in_days + + @property + def auto_renew_certificate(self): + """Gets the auto_renew_certificate of this CertificateChainInfo. # noqa: E501 + + + :return: The auto_renew_certificate of this CertificateChainInfo. # noqa: E501 + :rtype: bool + """ + return self._auto_renew_certificate + + @auto_renew_certificate.setter + def auto_renew_certificate(self, auto_renew_certificate): + """Sets the auto_renew_certificate of this CertificateChainInfo. + + + :param auto_renew_certificate: The auto_renew_certificate of this CertificateChainInfo. # noqa: E501 + :type: bool + """ + + self._auto_renew_certificate = auto_renew_certificate @property def certificate_chain(self): @@ -261,6 +297,27 @@ def certificate_status(self, certificate_status): self._certificate_status = certificate_status + @property + def error_message(self): + """Gets the error_message of this CertificateChainInfo. # noqa: E501 + + + :return: The error_message of this CertificateChainInfo. # noqa: E501 + :rtype: str + """ + return self._error_message + + @error_message.setter + def error_message(self, error_message): + """Sets the error_message of this CertificateChainInfo. + + + :param error_message: The error_message of this CertificateChainInfo. # noqa: E501 + :type: str + """ + + self._error_message = error_message + @property def expiration_events(self): """Gets the expiration_events of this CertificateChainInfo. # noqa: E501 @@ -282,6 +339,27 @@ def expiration_events(self, expiration_events): self._expiration_events = expiration_events + @property + def renew_before_expiration_in_days(self): + """Gets the renew_before_expiration_in_days of this CertificateChainInfo. # noqa: E501 + + + :return: The renew_before_expiration_in_days of this CertificateChainInfo. # noqa: E501 + :rtype: int + """ + return self._renew_before_expiration_in_days + + @renew_before_expiration_in_days.setter + def renew_before_expiration_in_days(self, renew_before_expiration_in_days): + """Sets the renew_before_expiration_in_days of this CertificateChainInfo. + + + :param renew_before_expiration_in_days: The renew_before_expiration_in_days of this CertificateChainInfo. # noqa: E501 + :type: int + """ + + self._renew_before_expiration_in_days = renew_before_expiration_in_days + def to_dict(self): """Returns the model properties as a dict""" result = {} diff --git a/akeyless/models/classic_key_details_info.py b/akeyless/models/classic_key_details_info.py index 6fbc3d38..3985715d 100644 --- a/akeyless/models/classic_key_details_info.py +++ b/akeyless/models/classic_key_details_info.py @@ -36,6 +36,7 @@ class ClassicKeyDetailsInfo(object): openapi_types = { 'classic_key_attributes': 'dict(str, list[str])', 'classic_key_id': 'str', + 'credential_id': 'str', 'gw_cluster_id': 'int', 'has_certificate': 'bool', 'is_provided_by_user': 'bool', @@ -46,12 +47,15 @@ class ClassicKeyDetailsInfo(object): 'public_key': 'str', 'target_alias_helper': 'str', 'target_types': 'list[str]', - 'targets': 'list[ClassicKeyTargetInfo]' + 'targets': 'list[ClassicKeyTargetInfo]', + 'username': 'str', + 'websites': 'list[str]' } attribute_map = { 'classic_key_attributes': 'classic_key_attributes', 'classic_key_id': 'classic_key_id', + 'credential_id': 'credential_id', 'gw_cluster_id': 'gw_cluster_id', 'has_certificate': 'has_certificate', 'is_provided_by_user': 'is_provided_by_user', @@ -62,10 +66,12 @@ class ClassicKeyDetailsInfo(object): 'public_key': 'public_key', 'target_alias_helper': 'target_alias_helper', 'target_types': 'target_types', - 'targets': 'targets' + 'targets': 'targets', + 'username': 'username', + 'websites': 'websites' } - def __init__(self, classic_key_attributes=None, classic_key_id=None, gw_cluster_id=None, has_certificate=None, is_provided_by_user=None, is_unexportable=None, key_state=None, key_type=None, last_error=None, public_key=None, target_alias_helper=None, target_types=None, targets=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, classic_key_attributes=None, classic_key_id=None, credential_id=None, gw_cluster_id=None, has_certificate=None, is_provided_by_user=None, is_unexportable=None, key_state=None, key_type=None, last_error=None, public_key=None, target_alias_helper=None, target_types=None, targets=None, username=None, websites=None, local_vars_configuration=None): # noqa: E501 """ClassicKeyDetailsInfo - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -73,6 +79,7 @@ def __init__(self, classic_key_attributes=None, classic_key_id=None, gw_cluster_ self._classic_key_attributes = None self._classic_key_id = None + self._credential_id = None self._gw_cluster_id = None self._has_certificate = None self._is_provided_by_user = None @@ -84,12 +91,16 @@ def __init__(self, classic_key_attributes=None, classic_key_id=None, gw_cluster_ self._target_alias_helper = None self._target_types = None self._targets = None + self._username = None + self._websites = None self.discriminator = None if classic_key_attributes is not None: self.classic_key_attributes = classic_key_attributes if classic_key_id is not None: self.classic_key_id = classic_key_id + if credential_id is not None: + self.credential_id = credential_id if gw_cluster_id is not None: self.gw_cluster_id = gw_cluster_id if has_certificate is not None: @@ -112,6 +123,10 @@ def __init__(self, classic_key_attributes=None, classic_key_id=None, gw_cluster_ self.target_types = target_types if targets is not None: self.targets = targets + if username is not None: + self.username = username + if websites is not None: + self.websites = websites @property def classic_key_attributes(self): @@ -155,6 +170,27 @@ def classic_key_id(self, classic_key_id): self._classic_key_id = classic_key_id + @property + def credential_id(self): + """Gets the credential_id of this ClassicKeyDetailsInfo. # noqa: E501 + + + :return: The credential_id of this ClassicKeyDetailsInfo. # noqa: E501 + :rtype: str + """ + return self._credential_id + + @credential_id.setter + def credential_id(self, credential_id): + """Sets the credential_id of this ClassicKeyDetailsInfo. + + + :param credential_id: The credential_id of this ClassicKeyDetailsInfo. # noqa: E501 + :type: str + """ + + self._credential_id = credential_id + @property def gw_cluster_id(self): """Gets the gw_cluster_id of this ClassicKeyDetailsInfo. # noqa: E501 @@ -388,6 +424,48 @@ def targets(self, targets): self._targets = targets + @property + def username(self): + """Gets the username of this ClassicKeyDetailsInfo. # noqa: E501 + + + :return: The username of this ClassicKeyDetailsInfo. # noqa: E501 + :rtype: str + """ + return self._username + + @username.setter + def username(self, username): + """Sets the username of this ClassicKeyDetailsInfo. + + + :param username: The username of this ClassicKeyDetailsInfo. # noqa: E501 + :type: str + """ + + self._username = username + + @property + def websites(self): + """Gets the websites of this ClassicKeyDetailsInfo. # noqa: E501 + + + :return: The websites of this ClassicKeyDetailsInfo. # noqa: E501 + :rtype: list[str] + """ + return self._websites + + @websites.setter + def websites(self, websites): + """Sets the websites of this ClassicKeyDetailsInfo. + + + :param websites: The websites of this ClassicKeyDetailsInfo. # noqa: E501 + :type: list[str] + """ + + self._websites = websites + def to_dict(self): """Returns the model properties as a dict""" result = {} diff --git a/akeyless/models/configure.py b/akeyless/models/configure.py index 670fee1e..0801add7 100644 --- a/akeyless/models/configure.py +++ b/akeyless/models/configure.py @@ -45,10 +45,15 @@ class Configure(object): 'cert_issuer_name': 'str', 'cert_username': 'str', 'default_location_prefix': 'str', + 'disable_pafxfast': 'str', + 'gateway_spn': 'str', 'gcp_audience': 'str', 'json': 'bool', 'k8s_auth_config_name': 'str', + 'kerberos_username': 'str', 'key_data': 'str', + 'keytab_data': 'str', + 'krb5_conf_data': 'str', 'legacy_signing_alg_name': 'bool', 'oci_auth_type': 'str', 'oci_group_ocid': 'list[str]' @@ -66,16 +71,21 @@ class Configure(object): 'cert_issuer_name': 'cert-issuer-name', 'cert_username': 'cert-username', 'default_location_prefix': 'default-location-prefix', + 'disable_pafxfast': 'disable-pafxfast', + 'gateway_spn': 'gateway-spn', 'gcp_audience': 'gcp-audience', 'json': 'json', 'k8s_auth_config_name': 'k8s-auth-config-name', + 'kerberos_username': 'kerberos-username', 'key_data': 'key-data', + 'keytab_data': 'keytab-data', + 'krb5_conf_data': 'krb5-conf-data', 'legacy_signing_alg_name': 'legacy-signing-alg-name', 'oci_auth_type': 'oci-auth-type', 'oci_group_ocid': 'oci-group-ocid' } - def __init__(self, access_id=None, access_key=None, access_type='access_key', account_id=None, admin_email=None, admin_password=None, azure_ad_object_id=None, cert_data=None, cert_issuer_name=None, cert_username=None, default_location_prefix=None, gcp_audience='akeyless.io', json=False, k8s_auth_config_name=None, key_data=None, legacy_signing_alg_name=None, oci_auth_type='apikey', oci_group_ocid=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, access_id=None, access_key=None, access_type='access_key', account_id=None, admin_email=None, admin_password=None, azure_ad_object_id=None, cert_data=None, cert_issuer_name=None, cert_username=None, default_location_prefix=None, disable_pafxfast=None, gateway_spn=None, gcp_audience='akeyless.io', json=False, k8s_auth_config_name=None, kerberos_username=None, key_data=None, keytab_data=None, krb5_conf_data=None, legacy_signing_alg_name=None, oci_auth_type='apikey', oci_group_ocid=None, local_vars_configuration=None): # noqa: E501 """Configure - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -92,10 +102,15 @@ def __init__(self, access_id=None, access_key=None, access_type='access_key', ac self._cert_issuer_name = None self._cert_username = None self._default_location_prefix = None + self._disable_pafxfast = None + self._gateway_spn = None self._gcp_audience = None self._json = None self._k8s_auth_config_name = None + self._kerberos_username = None self._key_data = None + self._keytab_data = None + self._krb5_conf_data = None self._legacy_signing_alg_name = None self._oci_auth_type = None self._oci_group_ocid = None @@ -123,14 +138,24 @@ def __init__(self, access_id=None, access_key=None, access_type='access_key', ac self.cert_username = cert_username if default_location_prefix is not None: self.default_location_prefix = default_location_prefix + if disable_pafxfast is not None: + self.disable_pafxfast = disable_pafxfast + if gateway_spn is not None: + self.gateway_spn = gateway_spn if gcp_audience is not None: self.gcp_audience = gcp_audience if json is not None: self.json = json if k8s_auth_config_name is not None: self.k8s_auth_config_name = k8s_auth_config_name + if kerberos_username is not None: + self.kerberos_username = kerberos_username if key_data is not None: self.key_data = key_data + if keytab_data is not None: + self.keytab_data = keytab_data + if krb5_conf_data is not None: + self.krb5_conf_data = krb5_conf_data if legacy_signing_alg_name is not None: self.legacy_signing_alg_name = legacy_signing_alg_name if oci_auth_type is not None: @@ -391,6 +416,52 @@ def default_location_prefix(self, default_location_prefix): self._default_location_prefix = default_location_prefix + @property + def disable_pafxfast(self): + """Gets the disable_pafxfast of this Configure. # noqa: E501 + + Disable the FAST negotiation in the Kerberos authentication method # noqa: E501 + + :return: The disable_pafxfast of this Configure. # noqa: E501 + :rtype: str + """ + return self._disable_pafxfast + + @disable_pafxfast.setter + def disable_pafxfast(self, disable_pafxfast): + """Sets the disable_pafxfast of this Configure. + + Disable the FAST negotiation in the Kerberos authentication method # noqa: E501 + + :param disable_pafxfast: The disable_pafxfast of this Configure. # noqa: E501 + :type: str + """ + + self._disable_pafxfast = disable_pafxfast + + @property + def gateway_spn(self): + """Gets the gateway_spn of this Configure. # noqa: E501 + + The service principal name of the gateway as registered in LDAP (i.e., HTTP/gateway) # noqa: E501 + + :return: The gateway_spn of this Configure. # noqa: E501 + :rtype: str + """ + return self._gateway_spn + + @gateway_spn.setter + def gateway_spn(self, gateway_spn): + """Sets the gateway_spn of this Configure. + + The service principal name of the gateway as registered in LDAP (i.e., HTTP/gateway) # noqa: E501 + + :param gateway_spn: The gateway_spn of this Configure. # noqa: E501 + :type: str + """ + + self._gateway_spn = gateway_spn + @property def gcp_audience(self): """Gets the gcp_audience of this Configure. # noqa: E501 @@ -460,6 +531,29 @@ def k8s_auth_config_name(self, k8s_auth_config_name): self._k8s_auth_config_name = k8s_auth_config_name + @property + def kerberos_username(self): + """Gets the kerberos_username of this Configure. # noqa: E501 + + TThe username for the entry within the keytab to authenticate via Kerberos # noqa: E501 + + :return: The kerberos_username of this Configure. # noqa: E501 + :rtype: str + """ + return self._kerberos_username + + @kerberos_username.setter + def kerberos_username(self, kerberos_username): + """Sets the kerberos_username of this Configure. + + TThe username for the entry within the keytab to authenticate via Kerberos # noqa: E501 + + :param kerberos_username: The kerberos_username of this Configure. # noqa: E501 + :type: str + """ + + self._kerberos_username = kerberos_username + @property def key_data(self): """Gets the key_data of this Configure. # noqa: E501 @@ -483,6 +577,52 @@ def key_data(self, key_data): self._key_data = key_data + @property + def keytab_data(self): + """Gets the keytab_data of this Configure. # noqa: E501 + + Base64-encoded content of a valid keytab file, containing the service account's entry. # noqa: E501 + + :return: The keytab_data of this Configure. # noqa: E501 + :rtype: str + """ + return self._keytab_data + + @keytab_data.setter + def keytab_data(self, keytab_data): + """Sets the keytab_data of this Configure. + + Base64-encoded content of a valid keytab file, containing the service account's entry. # noqa: E501 + + :param keytab_data: The keytab_data of this Configure. # noqa: E501 + :type: str + """ + + self._keytab_data = keytab_data + + @property + def krb5_conf_data(self): + """Gets the krb5_conf_data of this Configure. # noqa: E501 + + Base64-encoded content of a valid krb5.conf file, specifying the settings and parameters required for Kerberos authentication. # noqa: E501 + + :return: The krb5_conf_data of this Configure. # noqa: E501 + :rtype: str + """ + return self._krb5_conf_data + + @krb5_conf_data.setter + def krb5_conf_data(self, krb5_conf_data): + """Sets the krb5_conf_data of this Configure. + + Base64-encoded content of a valid krb5.conf file, specifying the settings and parameters required for Kerberos authentication. # noqa: E501 + + :param krb5_conf_data: The krb5_conf_data of this Configure. # noqa: E501 + :type: str + """ + + self._krb5_conf_data = krb5_conf_data + @property def legacy_signing_alg_name(self): """Gets the legacy_signing_alg_name of this Configure. # noqa: E501 diff --git a/akeyless/models/create_passkey.py b/akeyless/models/create_passkey.py new file mode 100644 index 00000000..204ec5e1 --- /dev/null +++ b/akeyless/models/create_passkey.py @@ -0,0 +1,433 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class CreatePasskey(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'accessibility': 'str', + 'alg': 'str', + 'delete_protection': 'str', + 'description': 'str', + 'json': 'bool', + 'name': 'str', + 'origin_url': 'list[str]', + 'protection_key_name': 'str', + 'tags': 'list[str]', + 'token': 'str', + 'uid_token': 'str', + 'username': 'str' + } + + attribute_map = { + 'accessibility': 'accessibility', + 'alg': 'alg', + 'delete_protection': 'delete_protection', + 'description': 'description', + 'json': 'json', + 'name': 'name', + 'origin_url': 'origin-url', + 'protection_key_name': 'protection-key-name', + 'tags': 'tags', + 'token': 'token', + 'uid_token': 'uid-token', + 'username': 'username' + } + + def __init__(self, accessibility='regular', alg='EC256', delete_protection=None, description=None, json=False, name=None, origin_url=None, protection_key_name=None, tags=None, token=None, uid_token=None, username=None, local_vars_configuration=None): # noqa: E501 + """CreatePasskey - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._accessibility = None + self._alg = None + self._delete_protection = None + self._description = None + self._json = None + self._name = None + self._origin_url = None + self._protection_key_name = None + self._tags = None + self._token = None + self._uid_token = None + self._username = None + self.discriminator = None + + if accessibility is not None: + self.accessibility = accessibility + self.alg = alg + if delete_protection is not None: + self.delete_protection = delete_protection + if description is not None: + self.description = description + if json is not None: + self.json = json + self.name = name + if origin_url is not None: + self.origin_url = origin_url + if protection_key_name is not None: + self.protection_key_name = protection_key_name + if tags is not None: + self.tags = tags + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + if username is not None: + self.username = username + + @property + def accessibility(self): + """Gets the accessibility of this CreatePasskey. # noqa: E501 + + for personal password manager # noqa: E501 + + :return: The accessibility of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._accessibility + + @accessibility.setter + def accessibility(self, accessibility): + """Sets the accessibility of this CreatePasskey. + + for personal password manager # noqa: E501 + + :param accessibility: The accessibility of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._accessibility = accessibility + + @property + def alg(self): + """Gets the alg of this CreatePasskey. # noqa: E501 + + Passkey type; options: [EC256, EC384, EC512] # noqa: E501 + + :return: The alg of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._alg + + @alg.setter + def alg(self, alg): + """Sets the alg of this CreatePasskey. + + Passkey type; options: [EC256, EC384, EC512] # noqa: E501 + + :param alg: The alg of this CreatePasskey. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and alg is None: # noqa: E501 + raise ValueError("Invalid value for `alg`, must not be `None`") # noqa: E501 + + self._alg = alg + + @property + def delete_protection(self): + """Gets the delete_protection of this CreatePasskey. # noqa: E501 + + Protection from accidental deletion of this object [true/false] # noqa: E501 + + :return: The delete_protection of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._delete_protection + + @delete_protection.setter + def delete_protection(self, delete_protection): + """Sets the delete_protection of this CreatePasskey. + + Protection from accidental deletion of this object [true/false] # noqa: E501 + + :param delete_protection: The delete_protection of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._delete_protection = delete_protection + + @property + def description(self): + """Gets the description of this CreatePasskey. # noqa: E501 + + Description of the object # noqa: E501 + + :return: The description of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._description + + @description.setter + def description(self, description): + """Sets the description of this CreatePasskey. + + Description of the object # noqa: E501 + + :param description: The description of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._description = description + + @property + def json(self): + """Gets the json of this CreatePasskey. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this CreatePasskey. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this CreatePasskey. + + Set output format to JSON # noqa: E501 + + :param json: The json of this CreatePasskey. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def name(self): + """Gets the name of this CreatePasskey. # noqa: E501 + + ClassicKey name # noqa: E501 + + :return: The name of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._name + + @name.setter + def name(self, name): + """Sets the name of this CreatePasskey. + + ClassicKey name # noqa: E501 + + :param name: The name of this CreatePasskey. # noqa: E501 + :type: str + """ + if self.local_vars_configuration.client_side_validation and name is None: # noqa: E501 + raise ValueError("Invalid value for `name`, must not be `None`") # noqa: E501 + + self._name = name + + @property + def origin_url(self): + """Gets the origin_url of this CreatePasskey. # noqa: E501 + + Originating websites for this passkey # noqa: E501 + + :return: The origin_url of this CreatePasskey. # noqa: E501 + :rtype: list[str] + """ + return self._origin_url + + @origin_url.setter + def origin_url(self, origin_url): + """Sets the origin_url of this CreatePasskey. + + Originating websites for this passkey # noqa: E501 + + :param origin_url: The origin_url of this CreatePasskey. # noqa: E501 + :type: list[str] + """ + + self._origin_url = origin_url + + @property + def protection_key_name(self): + """Gets the protection_key_name of this CreatePasskey. # noqa: E501 + + The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) # noqa: E501 + + :return: The protection_key_name of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._protection_key_name + + @protection_key_name.setter + def protection_key_name(self, protection_key_name): + """Sets the protection_key_name of this CreatePasskey. + + The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) # noqa: E501 + + :param protection_key_name: The protection_key_name of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._protection_key_name = protection_key_name + + @property + def tags(self): + """Gets the tags of this CreatePasskey. # noqa: E501 + + Add tags attached to this object # noqa: E501 + + :return: The tags of this CreatePasskey. # noqa: E501 + :rtype: list[str] + """ + return self._tags + + @tags.setter + def tags(self, tags): + """Sets the tags of this CreatePasskey. + + Add tags attached to this object # noqa: E501 + + :param tags: The tags of this CreatePasskey. # noqa: E501 + :type: list[str] + """ + + self._tags = tags + + @property + def token(self): + """Gets the token of this CreatePasskey. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this CreatePasskey. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this CreatePasskey. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this CreatePasskey. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + @property + def username(self): + """Gets the username of this CreatePasskey. # noqa: E501 + + For Password Management use # noqa: E501 + + :return: The username of this CreatePasskey. # noqa: E501 + :rtype: str + """ + return self._username + + @username.setter + def username(self, username): + """Sets the username of this CreatePasskey. + + For Password Management use # noqa: E501 + + :param username: The username of this CreatePasskey. # noqa: E501 + :type: str + """ + + self._username = username + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, CreatePasskey): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, CreatePasskey): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/create_passkey_output.py b/akeyless/models/create_passkey_output.py new file mode 100644 index 00000000..b9b61c83 --- /dev/null +++ b/akeyless/models/create_passkey_output.py @@ -0,0 +1,199 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class CreatePasskeyOutput(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'classic_key_id': 'str', + 'classic_key_name': 'str', + 'classic_key_type': 'str', + 'public_key': 'str' + } + + attribute_map = { + 'classic_key_id': 'classic_key_id', + 'classic_key_name': 'classic_key_name', + 'classic_key_type': 'classic_key_type', + 'public_key': 'public_key' + } + + def __init__(self, classic_key_id=None, classic_key_name=None, classic_key_type=None, public_key=None, local_vars_configuration=None): # noqa: E501 + """CreatePasskeyOutput - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._classic_key_id = None + self._classic_key_name = None + self._classic_key_type = None + self._public_key = None + self.discriminator = None + + if classic_key_id is not None: + self.classic_key_id = classic_key_id + if classic_key_name is not None: + self.classic_key_name = classic_key_name + if classic_key_type is not None: + self.classic_key_type = classic_key_type + if public_key is not None: + self.public_key = public_key + + @property + def classic_key_id(self): + """Gets the classic_key_id of this CreatePasskeyOutput. # noqa: E501 + + + :return: The classic_key_id of this CreatePasskeyOutput. # noqa: E501 + :rtype: str + """ + return self._classic_key_id + + @classic_key_id.setter + def classic_key_id(self, classic_key_id): + """Sets the classic_key_id of this CreatePasskeyOutput. + + + :param classic_key_id: The classic_key_id of this CreatePasskeyOutput. # noqa: E501 + :type: str + """ + + self._classic_key_id = classic_key_id + + @property + def classic_key_name(self): + """Gets the classic_key_name of this CreatePasskeyOutput. # noqa: E501 + + + :return: The classic_key_name of this CreatePasskeyOutput. # noqa: E501 + :rtype: str + """ + return self._classic_key_name + + @classic_key_name.setter + def classic_key_name(self, classic_key_name): + """Sets the classic_key_name of this CreatePasskeyOutput. + + + :param classic_key_name: The classic_key_name of this CreatePasskeyOutput. # noqa: E501 + :type: str + """ + + self._classic_key_name = classic_key_name + + @property + def classic_key_type(self): + """Gets the classic_key_type of this CreatePasskeyOutput. # noqa: E501 + + + :return: The classic_key_type of this CreatePasskeyOutput. # noqa: E501 + :rtype: str + """ + return self._classic_key_type + + @classic_key_type.setter + def classic_key_type(self, classic_key_type): + """Sets the classic_key_type of this CreatePasskeyOutput. + + + :param classic_key_type: The classic_key_type of this CreatePasskeyOutput. # noqa: E501 + :type: str + """ + + self._classic_key_type = classic_key_type + + @property + def public_key(self): + """Gets the public_key of this CreatePasskeyOutput. # noqa: E501 + + + :return: The public_key of this CreatePasskeyOutput. # noqa: E501 + :rtype: str + """ + return self._public_key + + @public_key.setter + def public_key(self, public_key): + """Sets the public_key of this CreatePasskeyOutput. + + + :param public_key: The public_key of this CreatePasskeyOutput. # noqa: E501 + :type: str + """ + + self._public_key = public_key + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, CreatePasskeyOutput): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, CreatePasskeyOutput): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/create_pki_cert_issuer.py b/akeyless/models/create_pki_cert_issuer.py index 867f1d01..db707337 100644 --- a/akeyless/models/create_pki_cert_issuer.py +++ b/akeyless/models/create_pki_cert_issuer.py @@ -40,6 +40,7 @@ class CreatePKICertIssuer(object): 'allowed_domains': 'str', 'allowed_extra_extensions': 'str', 'allowed_uri_sans': 'str', + 'auto_renew': 'bool', 'ca_target': 'str', 'client_flag': 'bool', 'code_signing_flag': 'bool', @@ -66,6 +67,7 @@ class CreatePKICertIssuer(object): 'postal_code': 'str', 'protect_certificates': 'bool', 'province': 'str', + 'scheduled_renew': 'int', 'server_flag': 'bool', 'signer_key_name': 'str', 'street_address': 'str', @@ -82,6 +84,7 @@ class CreatePKICertIssuer(object): 'allowed_domains': 'allowed-domains', 'allowed_extra_extensions': 'allowed-extra-extensions', 'allowed_uri_sans': 'allowed-uri-sans', + 'auto_renew': 'auto-renew', 'ca_target': 'ca-target', 'client_flag': 'client-flag', 'code_signing_flag': 'code-signing-flag', @@ -108,6 +111,7 @@ class CreatePKICertIssuer(object): 'postal_code': 'postal-code', 'protect_certificates': 'protect-certificates', 'province': 'province', + 'scheduled_renew': 'scheduled-renew', 'server_flag': 'server-flag', 'signer_key_name': 'signer-key-name', 'street_address': 'street-address', @@ -117,7 +121,7 @@ class CreatePKICertIssuer(object): 'uid_token': 'uid-token' } - def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, ca_target=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, critical_key_usage='true', delete_protection=None, description=None, destination_path=None, enable_acme=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, tag=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, auto_renew=None, ca_target=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, critical_key_usage='true', delete_protection=None, description=None, destination_path=None, enable_acme=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, scheduled_renew=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, tag=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 """CreatePKICertIssuer - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -129,6 +133,7 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self._allowed_domains = None self._allowed_extra_extensions = None self._allowed_uri_sans = None + self._auto_renew = None self._ca_target = None self._client_flag = None self._code_signing_flag = None @@ -155,6 +160,7 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self._postal_code = None self._protect_certificates = None self._province = None + self._scheduled_renew = None self._server_flag = None self._signer_key_name = None self._street_address = None @@ -176,6 +182,8 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self.allowed_extra_extensions = allowed_extra_extensions if allowed_uri_sans is not None: self.allowed_uri_sans = allowed_uri_sans + if auto_renew is not None: + self.auto_renew = auto_renew if ca_target is not None: self.ca_target = ca_target if client_flag is not None: @@ -227,6 +235,8 @@ def __init__(self, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subd self.protect_certificates = protect_certificates if province is not None: self.province = province + if scheduled_renew is not None: + self.scheduled_renew = scheduled_renew if server_flag is not None: self.server_flag = server_flag self.signer_key_name = signer_key_name @@ -378,6 +388,29 @@ def allowed_uri_sans(self, allowed_uri_sans): self._allowed_uri_sans = allowed_uri_sans + @property + def auto_renew(self): + """Gets the auto_renew of this CreatePKICertIssuer. # noqa: E501 + + Automatically renew certificates before expiration # noqa: E501 + + :return: The auto_renew of this CreatePKICertIssuer. # noqa: E501 + :rtype: bool + """ + return self._auto_renew + + @auto_renew.setter + def auto_renew(self, auto_renew): + """Sets the auto_renew of this CreatePKICertIssuer. + + Automatically renew certificates before expiration # noqa: E501 + + :param auto_renew: The auto_renew of this CreatePKICertIssuer. # noqa: E501 + :type: bool + """ + + self._auto_renew = auto_renew + @property def ca_target(self): """Gets the ca_target of this CreatePKICertIssuer. # noqa: E501 @@ -978,6 +1011,29 @@ def province(self, province): self._province = province + @property + def scheduled_renew(self): + """Gets the scheduled_renew of this CreatePKICertIssuer. # noqa: E501 + + Number of days before expiration to renew certificates # noqa: E501 + + :return: The scheduled_renew of this CreatePKICertIssuer. # noqa: E501 + :rtype: int + """ + return self._scheduled_renew + + @scheduled_renew.setter + def scheduled_renew(self, scheduled_renew): + """Sets the scheduled_renew of this CreatePKICertIssuer. + + Number of days before expiration to renew certificates # noqa: E501 + + :param scheduled_renew: The scheduled_renew of this CreatePKICertIssuer. # noqa: E501 + :type: int + """ + + self._scheduled_renew = scheduled_renew + @property def server_flag(self): """Gets the server_flag of this CreatePKICertIssuer. # noqa: E501 diff --git a/akeyless/models/event_forwarder_create_email.py b/akeyless/models/event_forwarder_create_email.py index 78ed4630..b08c38a8 100644 --- a/akeyless/models/event_forwarder_create_email.py +++ b/akeyless/models/event_forwarder_create_email.py @@ -198,7 +198,7 @@ def email_to(self, email_to): def event_types(self): """Gets the event_types of this EventForwarderCreateEmail. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderCreateEmail. # noqa: E501 :rtype: list[str] @@ -209,7 +209,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderCreateEmail. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderCreateEmail. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_create_service_now.py b/akeyless/models/event_forwarder_create_service_now.py index 76d7882d..8f29d446 100644 --- a/akeyless/models/event_forwarder_create_service_now.py +++ b/akeyless/models/event_forwarder_create_service_now.py @@ -338,7 +338,7 @@ def description(self, description): def event_types(self): """Gets the event_types of this EventForwarderCreateServiceNow. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderCreateServiceNow. # noqa: E501 :rtype: list[str] @@ -349,7 +349,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderCreateServiceNow. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderCreateServiceNow. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_create_slack.py b/akeyless/models/event_forwarder_create_slack.py index 4cf2d14f..1f3abec4 100644 --- a/akeyless/models/event_forwarder_create_slack.py +++ b/akeyless/models/event_forwarder_create_slack.py @@ -164,7 +164,7 @@ def description(self, description): def event_types(self): """Gets the event_types of this EventForwarderCreateSlack. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderCreateSlack. # noqa: E501 :rtype: list[str] @@ -175,7 +175,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderCreateSlack. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderCreateSlack. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_create_webhook.py b/akeyless/models/event_forwarder_create_webhook.py index 7075978f..55c5a5b8 100644 --- a/akeyless/models/event_forwarder_create_webhook.py +++ b/akeyless/models/event_forwarder_create_webhook.py @@ -200,7 +200,7 @@ def auth_token(self, auth_token): def auth_type(self): """Gets the auth_type of this EventForwarderCreateWebhook. # noqa: E501 - The Webhook authentication type [user-pass, token, certificate] # noqa: E501 + The Webhook authentication type [user-pass, bearer-token, certificate] # noqa: E501 :return: The auth_type of this EventForwarderCreateWebhook. # noqa: E501 :rtype: str @@ -211,7 +211,7 @@ def auth_type(self): def auth_type(self, auth_type): """Sets the auth_type of this EventForwarderCreateWebhook. - The Webhook authentication type [user-pass, token, certificate] # noqa: E501 + The Webhook authentication type [user-pass, bearer-token, certificate] # noqa: E501 :param auth_type: The auth_type of this EventForwarderCreateWebhook. # noqa: E501 :type: str @@ -269,7 +269,7 @@ def description(self, description): def event_types(self): """Gets the event_types of this EventForwarderCreateWebhook. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderCreateWebhook. # noqa: E501 :rtype: list[str] @@ -280,7 +280,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderCreateWebhook. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderCreateWebhook. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_update_email.py b/akeyless/models/event_forwarder_update_email.py index 9be3a900..4732bb13 100644 --- a/akeyless/models/event_forwarder_update_email.py +++ b/akeyless/models/event_forwarder_update_email.py @@ -227,7 +227,7 @@ def enable(self, enable): def event_types(self): """Gets the event_types of this EventForwarderUpdateEmail. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderUpdateEmail. # noqa: E501 :rtype: list[str] @@ -238,7 +238,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderUpdateEmail. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderUpdateEmail. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_update_service_now.py b/akeyless/models/event_forwarder_update_service_now.py index c3687012..19d7f184 100644 --- a/akeyless/models/event_forwarder_update_service_now.py +++ b/akeyless/models/event_forwarder_update_service_now.py @@ -367,7 +367,7 @@ def enable(self, enable): def event_types(self): """Gets the event_types of this EventForwarderUpdateServiceNow. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderUpdateServiceNow. # noqa: E501 :rtype: list[str] @@ -378,7 +378,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderUpdateServiceNow. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderUpdateServiceNow. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_update_slack.py b/akeyless/models/event_forwarder_update_slack.py index 4bf254c3..b6262cb5 100644 --- a/akeyless/models/event_forwarder_update_slack.py +++ b/akeyless/models/event_forwarder_update_slack.py @@ -193,7 +193,7 @@ def enable(self, enable): def event_types(self): """Gets the event_types of this EventForwarderUpdateSlack. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderUpdateSlack. # noqa: E501 :rtype: list[str] @@ -204,7 +204,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderUpdateSlack. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderUpdateSlack. # noqa: E501 :type: list[str] diff --git a/akeyless/models/event_forwarder_update_webhook.py b/akeyless/models/event_forwarder_update_webhook.py index 0d6455dd..870f86e6 100644 --- a/akeyless/models/event_forwarder_update_webhook.py +++ b/akeyless/models/event_forwarder_update_webhook.py @@ -206,7 +206,7 @@ def auth_token(self, auth_token): def auth_type(self): """Gets the auth_type of this EventForwarderUpdateWebhook. # noqa: E501 - The Webhook authentication type [user-pass, token, certificate] # noqa: E501 + The Webhook authentication type [user-pass, bearer-token, certificate] # noqa: E501 :return: The auth_type of this EventForwarderUpdateWebhook. # noqa: E501 :rtype: str @@ -217,7 +217,7 @@ def auth_type(self): def auth_type(self, auth_type): """Sets the auth_type of this EventForwarderUpdateWebhook. - The Webhook authentication type [user-pass, token, certificate] # noqa: E501 + The Webhook authentication type [user-pass, bearer-token, certificate] # noqa: E501 :param auth_type: The auth_type of this EventForwarderUpdateWebhook. # noqa: E501 :type: str @@ -298,7 +298,7 @@ def enable(self, enable): def event_types(self): """Gets the event_types of this EventForwarderUpdateWebhook. # noqa: E501 - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :return: The event_types of this EventForwarderUpdateWebhook. # noqa: E501 :rtype: list[str] @@ -309,7 +309,7 @@ def event_types(self): def event_types(self, event_types): """Sets the event_types of this EventForwarderUpdateWebhook. - List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] # noqa: E501 + List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] # noqa: E501 :param event_types: The event_types of this EventForwarderUpdateWebhook. # noqa: E501 :type: list[str] diff --git a/akeyless/models/export_classic_key.py b/akeyless/models/export_classic_key.py index 3feb1871..9209b6a4 100644 --- a/akeyless/models/export_classic_key.py +++ b/akeyless/models/export_classic_key.py @@ -34,6 +34,7 @@ class ExportClassicKey(object): and the value is json key in definition. """ openapi_types = { + 'accessibility': 'str', 'export_public_key': 'bool', 'ignore_cache': 'str', 'json': 'bool', @@ -44,6 +45,7 @@ class ExportClassicKey(object): } attribute_map = { + 'accessibility': 'accessibility', 'export_public_key': 'export-public-key', 'ignore_cache': 'ignore-cache', 'json': 'json', @@ -53,12 +55,13 @@ class ExportClassicKey(object): 'version': 'version' } - def __init__(self, export_public_key=False, ignore_cache='false', json=False, name=None, token=None, uid_token=None, version=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, accessibility='regular', export_public_key=False, ignore_cache='false', json=False, name=None, token=None, uid_token=None, version=None, local_vars_configuration=None): # noqa: E501 """ExportClassicKey - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() self.local_vars_configuration = local_vars_configuration + self._accessibility = None self._export_public_key = None self._ignore_cache = None self._json = None @@ -68,6 +71,8 @@ def __init__(self, export_public_key=False, ignore_cache='false', json=False, na self._version = None self.discriminator = None + if accessibility is not None: + self.accessibility = accessibility if export_public_key is not None: self.export_public_key = export_public_key if ignore_cache is not None: @@ -82,6 +87,29 @@ def __init__(self, export_public_key=False, ignore_cache='false', json=False, na if version is not None: self.version = version + @property + def accessibility(self): + """Gets the accessibility of this ExportClassicKey. # noqa: E501 + + for personal password manager # noqa: E501 + + :return: The accessibility of this ExportClassicKey. # noqa: E501 + :rtype: str + """ + return self._accessibility + + @accessibility.setter + def accessibility(self, accessibility): + """Sets the accessibility of this ExportClassicKey. + + for personal password manager # noqa: E501 + + :param accessibility: The accessibility of this ExportClassicKey. # noqa: E501 + :type: str + """ + + self._accessibility = accessibility + @property def export_public_key(self): """Gets the export_public_key of this ExportClassicKey. # noqa: E501 diff --git a/akeyless/models/import_passwords.py b/akeyless/models/import_passwords.py index 02b6275a..db1c65b2 100644 --- a/akeyless/models/import_passwords.py +++ b/akeyless/models/import_passwords.py @@ -119,7 +119,7 @@ def accessibility(self, accessibility): def format(self): """Gets the format of this ImportPasswords. # noqa: E501 - Password format type [LastPass/Chrome/Firefox] # noqa: E501 + Password format type [LastPass/Chrome/Firefox/1password/keeper/bitwarden/dashlane] # noqa: E501 :return: The format of this ImportPasswords. # noqa: E501 :rtype: str @@ -130,7 +130,7 @@ def format(self): def format(self, format): """Sets the format of this ImportPasswords. - Password format type [LastPass/Chrome/Firefox] # noqa: E501 + Password format type [LastPass/Chrome/Firefox/1password/keeper/bitwarden/dashlane] # noqa: E501 :param format: The format of this ImportPasswords. # noqa: E501 :type: str diff --git a/akeyless/models/kerberos_access_rules.py b/akeyless/models/kerberos_access_rules.py new file mode 100644 index 00000000..454b2163 --- /dev/null +++ b/akeyless/models/kerberos_access_rules.py @@ -0,0 +1,147 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KerberosAccessRules(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'sign_public_key': 'str', + 'unique_identifier': 'str' + } + + attribute_map = { + 'sign_public_key': 'sign_public_key', + 'unique_identifier': 'unique_identifier' + } + + def __init__(self, sign_public_key=None, unique_identifier=None, local_vars_configuration=None): # noqa: E501 + """KerberosAccessRules - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._sign_public_key = None + self._unique_identifier = None + self.discriminator = None + + if sign_public_key is not None: + self.sign_public_key = sign_public_key + if unique_identifier is not None: + self.unique_identifier = unique_identifier + + @property + def sign_public_key(self): + """Gets the sign_public_key of this KerberosAccessRules. # noqa: E501 + + + :return: The sign_public_key of this KerberosAccessRules. # noqa: E501 + :rtype: str + """ + return self._sign_public_key + + @sign_public_key.setter + def sign_public_key(self, sign_public_key): + """Sets the sign_public_key of this KerberosAccessRules. + + + :param sign_public_key: The sign_public_key of this KerberosAccessRules. # noqa: E501 + :type: str + """ + + self._sign_public_key = sign_public_key + + @property + def unique_identifier(self): + """Gets the unique_identifier of this KerberosAccessRules. # noqa: E501 + + + :return: The unique_identifier of this KerberosAccessRules. # noqa: E501 + :rtype: str + """ + return self._unique_identifier + + @unique_identifier.setter + def unique_identifier(self, unique_identifier): + """Sets the unique_identifier of this KerberosAccessRules. + + + :param unique_identifier: The unique_identifier of this KerberosAccessRules. # noqa: E501 + :type: str + """ + + self._unique_identifier = unique_identifier + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KerberosAccessRules): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KerberosAccessRules): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kerberos_auth_method_info.py b/akeyless/models/kerberos_auth_method_info.py new file mode 100644 index 00000000..173480aa --- /dev/null +++ b/akeyless/models/kerberos_auth_method_info.py @@ -0,0 +1,407 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KerberosAuthMethodInfo(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'kerberos_keytab': 'str', + 'kerberos_krb5_conf': 'str', + 'ldap_anonymous_search': 'bool', + 'ldap_bind_dn': 'str', + 'ldap_bind_password': 'str', + 'ldap_certificate': 'str', + 'ldap_group_attr': 'str', + 'ldap_group_dn': 'str', + 'ldap_group_filter': 'str', + 'ldap_url_address': 'str', + 'ldap_user_attr': 'str', + 'ldap_user_dn': 'str' + } + + attribute_map = { + 'kerberos_keytab': 'kerberos_keytab', + 'kerberos_krb5_conf': 'kerberos_krb5_conf', + 'ldap_anonymous_search': 'ldap_anonymous_search', + 'ldap_bind_dn': 'ldap_bind_dn', + 'ldap_bind_password': 'ldap_bind_password', + 'ldap_certificate': 'ldap_certificate', + 'ldap_group_attr': 'ldap_group_attr', + 'ldap_group_dn': 'ldap_group_dn', + 'ldap_group_filter': 'ldap_group_filter', + 'ldap_url_address': 'ldap_url_address', + 'ldap_user_attr': 'ldap_user_attr', + 'ldap_user_dn': 'ldap_user_dn' + } + + def __init__(self, kerberos_keytab=None, kerberos_krb5_conf=None, ldap_anonymous_search=None, ldap_bind_dn=None, ldap_bind_password=None, ldap_certificate=None, ldap_group_attr=None, ldap_group_dn=None, ldap_group_filter=None, ldap_url_address=None, ldap_user_attr=None, ldap_user_dn=None, local_vars_configuration=None): # noqa: E501 + """KerberosAuthMethodInfo - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._kerberos_keytab = None + self._kerberos_krb5_conf = None + self._ldap_anonymous_search = None + self._ldap_bind_dn = None + self._ldap_bind_password = None + self._ldap_certificate = None + self._ldap_group_attr = None + self._ldap_group_dn = None + self._ldap_group_filter = None + self._ldap_url_address = None + self._ldap_user_attr = None + self._ldap_user_dn = None + self.discriminator = None + + if kerberos_keytab is not None: + self.kerberos_keytab = kerberos_keytab + if kerberos_krb5_conf is not None: + self.kerberos_krb5_conf = kerberos_krb5_conf + if ldap_anonymous_search is not None: + self.ldap_anonymous_search = ldap_anonymous_search + if ldap_bind_dn is not None: + self.ldap_bind_dn = ldap_bind_dn + if ldap_bind_password is not None: + self.ldap_bind_password = ldap_bind_password + if ldap_certificate is not None: + self.ldap_certificate = ldap_certificate + if ldap_group_attr is not None: + self.ldap_group_attr = ldap_group_attr + if ldap_group_dn is not None: + self.ldap_group_dn = ldap_group_dn + if ldap_group_filter is not None: + self.ldap_group_filter = ldap_group_filter + if ldap_url_address is not None: + self.ldap_url_address = ldap_url_address + if ldap_user_attr is not None: + self.ldap_user_attr = ldap_user_attr + if ldap_user_dn is not None: + self.ldap_user_dn = ldap_user_dn + + @property + def kerberos_keytab(self): + """Gets the kerberos_keytab of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The kerberos_keytab of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._kerberos_keytab + + @kerberos_keytab.setter + def kerberos_keytab(self, kerberos_keytab): + """Sets the kerberos_keytab of this KerberosAuthMethodInfo. + + + :param kerberos_keytab: The kerberos_keytab of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._kerberos_keytab = kerberos_keytab + + @property + def kerberos_krb5_conf(self): + """Gets the kerberos_krb5_conf of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The kerberos_krb5_conf of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._kerberos_krb5_conf + + @kerberos_krb5_conf.setter + def kerberos_krb5_conf(self, kerberos_krb5_conf): + """Sets the kerberos_krb5_conf of this KerberosAuthMethodInfo. + + + :param kerberos_krb5_conf: The kerberos_krb5_conf of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._kerberos_krb5_conf = kerberos_krb5_conf + + @property + def ldap_anonymous_search(self): + """Gets the ldap_anonymous_search of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_anonymous_search of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: bool + """ + return self._ldap_anonymous_search + + @ldap_anonymous_search.setter + def ldap_anonymous_search(self, ldap_anonymous_search): + """Sets the ldap_anonymous_search of this KerberosAuthMethodInfo. + + + :param ldap_anonymous_search: The ldap_anonymous_search of this KerberosAuthMethodInfo. # noqa: E501 + :type: bool + """ + + self._ldap_anonymous_search = ldap_anonymous_search + + @property + def ldap_bind_dn(self): + """Gets the ldap_bind_dn of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_bind_dn of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_bind_dn + + @ldap_bind_dn.setter + def ldap_bind_dn(self, ldap_bind_dn): + """Sets the ldap_bind_dn of this KerberosAuthMethodInfo. + + + :param ldap_bind_dn: The ldap_bind_dn of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_bind_dn = ldap_bind_dn + + @property + def ldap_bind_password(self): + """Gets the ldap_bind_password of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_bind_password of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_bind_password + + @ldap_bind_password.setter + def ldap_bind_password(self, ldap_bind_password): + """Sets the ldap_bind_password of this KerberosAuthMethodInfo. + + + :param ldap_bind_password: The ldap_bind_password of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_bind_password = ldap_bind_password + + @property + def ldap_certificate(self): + """Gets the ldap_certificate of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_certificate of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_certificate + + @ldap_certificate.setter + def ldap_certificate(self, ldap_certificate): + """Sets the ldap_certificate of this KerberosAuthMethodInfo. + + + :param ldap_certificate: The ldap_certificate of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_certificate = ldap_certificate + + @property + def ldap_group_attr(self): + """Gets the ldap_group_attr of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_group_attr of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_group_attr + + @ldap_group_attr.setter + def ldap_group_attr(self, ldap_group_attr): + """Sets the ldap_group_attr of this KerberosAuthMethodInfo. + + + :param ldap_group_attr: The ldap_group_attr of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_group_attr = ldap_group_attr + + @property + def ldap_group_dn(self): + """Gets the ldap_group_dn of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_group_dn of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_group_dn + + @ldap_group_dn.setter + def ldap_group_dn(self, ldap_group_dn): + """Sets the ldap_group_dn of this KerberosAuthMethodInfo. + + + :param ldap_group_dn: The ldap_group_dn of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_group_dn = ldap_group_dn + + @property + def ldap_group_filter(self): + """Gets the ldap_group_filter of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_group_filter of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_group_filter + + @ldap_group_filter.setter + def ldap_group_filter(self, ldap_group_filter): + """Sets the ldap_group_filter of this KerberosAuthMethodInfo. + + + :param ldap_group_filter: The ldap_group_filter of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_group_filter = ldap_group_filter + + @property + def ldap_url_address(self): + """Gets the ldap_url_address of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_url_address of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_url_address + + @ldap_url_address.setter + def ldap_url_address(self, ldap_url_address): + """Sets the ldap_url_address of this KerberosAuthMethodInfo. + + + :param ldap_url_address: The ldap_url_address of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_url_address = ldap_url_address + + @property + def ldap_user_attr(self): + """Gets the ldap_user_attr of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_user_attr of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_user_attr + + @ldap_user_attr.setter + def ldap_user_attr(self, ldap_user_attr): + """Sets the ldap_user_attr of this KerberosAuthMethodInfo. + + + :param ldap_user_attr: The ldap_user_attr of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_user_attr = ldap_user_attr + + @property + def ldap_user_dn(self): + """Gets the ldap_user_dn of this KerberosAuthMethodInfo. # noqa: E501 + + + :return: The ldap_user_dn of this KerberosAuthMethodInfo. # noqa: E501 + :rtype: str + """ + return self._ldap_user_dn + + @ldap_user_dn.setter + def ldap_user_dn(self, ldap_user_dn): + """Sets the ldap_user_dn of this KerberosAuthMethodInfo. + + + :param ldap_user_dn: The ldap_user_dn of this KerberosAuthMethodInfo. # noqa: E501 + :type: str + """ + + self._ldap_user_dn = ldap_user_dn + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KerberosAuthMethodInfo): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KerberosAuthMethodInfo): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kerberos_config_part.py b/akeyless/models/kerberos_config_part.py new file mode 100644 index 00000000..4da721d1 --- /dev/null +++ b/akeyless/models/kerberos_config_part.py @@ -0,0 +1,459 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KerberosConfigPart(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'kerberos_access_id': 'str', + 'kerberos_keytab': 'str', + 'kerberos_krb_5_conf': 'str', + 'kerberos_private_key': 'str', + 'ldap_anonymous_search': 'bool', + 'ldap_bind_dn': 'str', + 'ldap_bind_password': 'str', + 'ldap_cert': 'str', + 'ldap_group_attr': 'str', + 'ldap_group_dn': 'str', + 'ldap_group_filter': 'str', + 'ldap_url': 'str', + 'ldap_user_attr': 'str', + 'ldap_user_dn': 'str' + } + + attribute_map = { + 'kerberos_access_id': 'kerberos_access_id', + 'kerberos_keytab': 'kerberos_keytab', + 'kerberos_krb_5_conf': 'kerberos_krb_5_conf', + 'kerberos_private_key': 'kerberos_private_key', + 'ldap_anonymous_search': 'ldap_anonymous_search', + 'ldap_bind_dn': 'ldap_bind_dn', + 'ldap_bind_password': 'ldap_bind_password', + 'ldap_cert': 'ldap_cert', + 'ldap_group_attr': 'ldap_group_attr', + 'ldap_group_dn': 'ldap_group_dn', + 'ldap_group_filter': 'ldap_group_filter', + 'ldap_url': 'ldap_url', + 'ldap_user_attr': 'ldap_user_attr', + 'ldap_user_dn': 'ldap_user_dn' + } + + def __init__(self, kerberos_access_id=None, kerberos_keytab=None, kerberos_krb_5_conf=None, kerberos_private_key=None, ldap_anonymous_search=None, ldap_bind_dn=None, ldap_bind_password=None, ldap_cert=None, ldap_group_attr=None, ldap_group_dn=None, ldap_group_filter=None, ldap_url=None, ldap_user_attr=None, ldap_user_dn=None, local_vars_configuration=None): # noqa: E501 + """KerberosConfigPart - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._kerberos_access_id = None + self._kerberos_keytab = None + self._kerberos_krb_5_conf = None + self._kerberos_private_key = None + self._ldap_anonymous_search = None + self._ldap_bind_dn = None + self._ldap_bind_password = None + self._ldap_cert = None + self._ldap_group_attr = None + self._ldap_group_dn = None + self._ldap_group_filter = None + self._ldap_url = None + self._ldap_user_attr = None + self._ldap_user_dn = None + self.discriminator = None + + if kerberos_access_id is not None: + self.kerberos_access_id = kerberos_access_id + if kerberos_keytab is not None: + self.kerberos_keytab = kerberos_keytab + if kerberos_krb_5_conf is not None: + self.kerberos_krb_5_conf = kerberos_krb_5_conf + if kerberos_private_key is not None: + self.kerberos_private_key = kerberos_private_key + if ldap_anonymous_search is not None: + self.ldap_anonymous_search = ldap_anonymous_search + if ldap_bind_dn is not None: + self.ldap_bind_dn = ldap_bind_dn + if ldap_bind_password is not None: + self.ldap_bind_password = ldap_bind_password + if ldap_cert is not None: + self.ldap_cert = ldap_cert + if ldap_group_attr is not None: + self.ldap_group_attr = ldap_group_attr + if ldap_group_dn is not None: + self.ldap_group_dn = ldap_group_dn + if ldap_group_filter is not None: + self.ldap_group_filter = ldap_group_filter + if ldap_url is not None: + self.ldap_url = ldap_url + if ldap_user_attr is not None: + self.ldap_user_attr = ldap_user_attr + if ldap_user_dn is not None: + self.ldap_user_dn = ldap_user_dn + + @property + def kerberos_access_id(self): + """Gets the kerberos_access_id of this KerberosConfigPart. # noqa: E501 + + + :return: The kerberos_access_id of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._kerberos_access_id + + @kerberos_access_id.setter + def kerberos_access_id(self, kerberos_access_id): + """Sets the kerberos_access_id of this KerberosConfigPart. + + + :param kerberos_access_id: The kerberos_access_id of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._kerberos_access_id = kerberos_access_id + + @property + def kerberos_keytab(self): + """Gets the kerberos_keytab of this KerberosConfigPart. # noqa: E501 + + + :return: The kerberos_keytab of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._kerberos_keytab + + @kerberos_keytab.setter + def kerberos_keytab(self, kerberos_keytab): + """Sets the kerberos_keytab of this KerberosConfigPart. + + + :param kerberos_keytab: The kerberos_keytab of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._kerberos_keytab = kerberos_keytab + + @property + def kerberos_krb_5_conf(self): + """Gets the kerberos_krb_5_conf of this KerberosConfigPart. # noqa: E501 + + + :return: The kerberos_krb_5_conf of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._kerberos_krb_5_conf + + @kerberos_krb_5_conf.setter + def kerberos_krb_5_conf(self, kerberos_krb_5_conf): + """Sets the kerberos_krb_5_conf of this KerberosConfigPart. + + + :param kerberos_krb_5_conf: The kerberos_krb_5_conf of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._kerberos_krb_5_conf = kerberos_krb_5_conf + + @property + def kerberos_private_key(self): + """Gets the kerberos_private_key of this KerberosConfigPart. # noqa: E501 + + + :return: The kerberos_private_key of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._kerberos_private_key + + @kerberos_private_key.setter + def kerberos_private_key(self, kerberos_private_key): + """Sets the kerberos_private_key of this KerberosConfigPart. + + + :param kerberos_private_key: The kerberos_private_key of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._kerberos_private_key = kerberos_private_key + + @property + def ldap_anonymous_search(self): + """Gets the ldap_anonymous_search of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_anonymous_search of this KerberosConfigPart. # noqa: E501 + :rtype: bool + """ + return self._ldap_anonymous_search + + @ldap_anonymous_search.setter + def ldap_anonymous_search(self, ldap_anonymous_search): + """Sets the ldap_anonymous_search of this KerberosConfigPart. + + + :param ldap_anonymous_search: The ldap_anonymous_search of this KerberosConfigPart. # noqa: E501 + :type: bool + """ + + self._ldap_anonymous_search = ldap_anonymous_search + + @property + def ldap_bind_dn(self): + """Gets the ldap_bind_dn of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_bind_dn of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_bind_dn + + @ldap_bind_dn.setter + def ldap_bind_dn(self, ldap_bind_dn): + """Sets the ldap_bind_dn of this KerberosConfigPart. + + + :param ldap_bind_dn: The ldap_bind_dn of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_bind_dn = ldap_bind_dn + + @property + def ldap_bind_password(self): + """Gets the ldap_bind_password of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_bind_password of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_bind_password + + @ldap_bind_password.setter + def ldap_bind_password(self, ldap_bind_password): + """Sets the ldap_bind_password of this KerberosConfigPart. + + + :param ldap_bind_password: The ldap_bind_password of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_bind_password = ldap_bind_password + + @property + def ldap_cert(self): + """Gets the ldap_cert of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_cert of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_cert + + @ldap_cert.setter + def ldap_cert(self, ldap_cert): + """Sets the ldap_cert of this KerberosConfigPart. + + + :param ldap_cert: The ldap_cert of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_cert = ldap_cert + + @property + def ldap_group_attr(self): + """Gets the ldap_group_attr of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_group_attr of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_group_attr + + @ldap_group_attr.setter + def ldap_group_attr(self, ldap_group_attr): + """Sets the ldap_group_attr of this KerberosConfigPart. + + + :param ldap_group_attr: The ldap_group_attr of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_group_attr = ldap_group_attr + + @property + def ldap_group_dn(self): + """Gets the ldap_group_dn of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_group_dn of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_group_dn + + @ldap_group_dn.setter + def ldap_group_dn(self, ldap_group_dn): + """Sets the ldap_group_dn of this KerberosConfigPart. + + + :param ldap_group_dn: The ldap_group_dn of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_group_dn = ldap_group_dn + + @property + def ldap_group_filter(self): + """Gets the ldap_group_filter of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_group_filter of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_group_filter + + @ldap_group_filter.setter + def ldap_group_filter(self, ldap_group_filter): + """Sets the ldap_group_filter of this KerberosConfigPart. + + + :param ldap_group_filter: The ldap_group_filter of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_group_filter = ldap_group_filter + + @property + def ldap_url(self): + """Gets the ldap_url of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_url of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_url + + @ldap_url.setter + def ldap_url(self, ldap_url): + """Sets the ldap_url of this KerberosConfigPart. + + + :param ldap_url: The ldap_url of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_url = ldap_url + + @property + def ldap_user_attr(self): + """Gets the ldap_user_attr of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_user_attr of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_user_attr + + @ldap_user_attr.setter + def ldap_user_attr(self, ldap_user_attr): + """Sets the ldap_user_attr of this KerberosConfigPart. + + + :param ldap_user_attr: The ldap_user_attr of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_user_attr = ldap_user_attr + + @property + def ldap_user_dn(self): + """Gets the ldap_user_dn of this KerberosConfigPart. # noqa: E501 + + + :return: The ldap_user_dn of this KerberosConfigPart. # noqa: E501 + :rtype: str + """ + return self._ldap_user_dn + + @ldap_user_dn.setter + def ldap_user_dn(self, ldap_user_dn): + """Sets the ldap_user_dn of this KerberosConfigPart. + + + :param ldap_user_dn: The ldap_user_dn of this KerberosConfigPart. # noqa: E501 + :type: str + """ + + self._ldap_user_dn = ldap_user_dn + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KerberosConfigPart): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KerberosConfigPart): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kube_config_value.py b/akeyless/models/kube_config_value.py new file mode 100644 index 00000000..7de3de53 --- /dev/null +++ b/akeyless/models/kube_config_value.py @@ -0,0 +1,251 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeConfigValue(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'api_version': 'str', + 'clusters': 'list[KubeconfigNamedCluster]', + 'contexts': 'list[KubeconfigNamedContext]', + 'current_context': 'str', + 'kind': 'str', + 'users': 'list[KubeconfigUser]' + } + + attribute_map = { + 'api_version': 'apiVersion', + 'clusters': 'clusters', + 'contexts': 'contexts', + 'current_context': 'current-context', + 'kind': 'kind', + 'users': 'users' + } + + def __init__(self, api_version=None, clusters=None, contexts=None, current_context=None, kind=None, users=None, local_vars_configuration=None): # noqa: E501 + """KubeConfigValue - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._api_version = None + self._clusters = None + self._contexts = None + self._current_context = None + self._kind = None + self._users = None + self.discriminator = None + + if api_version is not None: + self.api_version = api_version + if clusters is not None: + self.clusters = clusters + if contexts is not None: + self.contexts = contexts + if current_context is not None: + self.current_context = current_context + if kind is not None: + self.kind = kind + if users is not None: + self.users = users + + @property + def api_version(self): + """Gets the api_version of this KubeConfigValue. # noqa: E501 + + + :return: The api_version of this KubeConfigValue. # noqa: E501 + :rtype: str + """ + return self._api_version + + @api_version.setter + def api_version(self, api_version): + """Sets the api_version of this KubeConfigValue. + + + :param api_version: The api_version of this KubeConfigValue. # noqa: E501 + :type: str + """ + + self._api_version = api_version + + @property + def clusters(self): + """Gets the clusters of this KubeConfigValue. # noqa: E501 + + + :return: The clusters of this KubeConfigValue. # noqa: E501 + :rtype: list[KubeconfigNamedCluster] + """ + return self._clusters + + @clusters.setter + def clusters(self, clusters): + """Sets the clusters of this KubeConfigValue. + + + :param clusters: The clusters of this KubeConfigValue. # noqa: E501 + :type: list[KubeconfigNamedCluster] + """ + + self._clusters = clusters + + @property + def contexts(self): + """Gets the contexts of this KubeConfigValue. # noqa: E501 + + + :return: The contexts of this KubeConfigValue. # noqa: E501 + :rtype: list[KubeconfigNamedContext] + """ + return self._contexts + + @contexts.setter + def contexts(self, contexts): + """Sets the contexts of this KubeConfigValue. + + + :param contexts: The contexts of this KubeConfigValue. # noqa: E501 + :type: list[KubeconfigNamedContext] + """ + + self._contexts = contexts + + @property + def current_context(self): + """Gets the current_context of this KubeConfigValue. # noqa: E501 + + + :return: The current_context of this KubeConfigValue. # noqa: E501 + :rtype: str + """ + return self._current_context + + @current_context.setter + def current_context(self, current_context): + """Sets the current_context of this KubeConfigValue. + + + :param current_context: The current_context of this KubeConfigValue. # noqa: E501 + :type: str + """ + + self._current_context = current_context + + @property + def kind(self): + """Gets the kind of this KubeConfigValue. # noqa: E501 + + + :return: The kind of this KubeConfigValue. # noqa: E501 + :rtype: str + """ + return self._kind + + @kind.setter + def kind(self, kind): + """Sets the kind of this KubeConfigValue. + + + :param kind: The kind of this KubeConfigValue. # noqa: E501 + :type: str + """ + + self._kind = kind + + @property + def users(self): + """Gets the users of this KubeConfigValue. # noqa: E501 + + + :return: The users of this KubeConfigValue. # noqa: E501 + :rtype: list[KubeconfigUser] + """ + return self._users + + @users.setter + def users(self, users): + """Sets the users of this KubeConfigValue. + + + :param users: The users of this KubeConfigValue. # noqa: E501 + :type: list[KubeconfigUser] + """ + + self._users = users + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeConfigValue): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeConfigValue): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_cluster.py b/akeyless/models/kubeconfig_cluster.py new file mode 100644 index 00000000..3a7e6518 --- /dev/null +++ b/akeyless/models/kubeconfig_cluster.py @@ -0,0 +1,175 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigCluster(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'certificate_authority': 'str', + 'certificate_authority_data': 'str', + 'server': 'str' + } + + attribute_map = { + 'certificate_authority': 'certificate-authority', + 'certificate_authority_data': 'certificate-authority-data', + 'server': 'server' + } + + def __init__(self, certificate_authority=None, certificate_authority_data=None, server=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigCluster - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._certificate_authority = None + self._certificate_authority_data = None + self._server = None + self.discriminator = None + + if certificate_authority is not None: + self.certificate_authority = certificate_authority + if certificate_authority_data is not None: + self.certificate_authority_data = certificate_authority_data + if server is not None: + self.server = server + + @property + def certificate_authority(self): + """Gets the certificate_authority of this KubeconfigCluster. # noqa: E501 + + CertificateAuthority is optional and can be omitted if not used. # noqa: E501 + + :return: The certificate_authority of this KubeconfigCluster. # noqa: E501 + :rtype: str + """ + return self._certificate_authority + + @certificate_authority.setter + def certificate_authority(self, certificate_authority): + """Sets the certificate_authority of this KubeconfigCluster. + + CertificateAuthority is optional and can be omitted if not used. # noqa: E501 + + :param certificate_authority: The certificate_authority of this KubeconfigCluster. # noqa: E501 + :type: str + """ + + self._certificate_authority = certificate_authority + + @property + def certificate_authority_data(self): + """Gets the certificate_authority_data of this KubeconfigCluster. # noqa: E501 + + + :return: The certificate_authority_data of this KubeconfigCluster. # noqa: E501 + :rtype: str + """ + return self._certificate_authority_data + + @certificate_authority_data.setter + def certificate_authority_data(self, certificate_authority_data): + """Sets the certificate_authority_data of this KubeconfigCluster. + + + :param certificate_authority_data: The certificate_authority_data of this KubeconfigCluster. # noqa: E501 + :type: str + """ + + self._certificate_authority_data = certificate_authority_data + + @property + def server(self): + """Gets the server of this KubeconfigCluster. # noqa: E501 + + + :return: The server of this KubeconfigCluster. # noqa: E501 + :rtype: str + """ + return self._server + + @server.setter + def server(self, server): + """Sets the server of this KubeconfigCluster. + + + :param server: The server of this KubeconfigCluster. # noqa: E501 + :type: str + """ + + self._server = server + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigCluster): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigCluster): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_context.py b/akeyless/models/kubeconfig_context.py new file mode 100644 index 00000000..ca951cda --- /dev/null +++ b/akeyless/models/kubeconfig_context.py @@ -0,0 +1,173 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigContext(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'cluster': 'str', + 'namespace': 'str', + 'user': 'str' + } + + attribute_map = { + 'cluster': 'cluster', + 'namespace': 'namespace', + 'user': 'user' + } + + def __init__(self, cluster=None, namespace=None, user=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigContext - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._cluster = None + self._namespace = None + self._user = None + self.discriminator = None + + if cluster is not None: + self.cluster = cluster + if namespace is not None: + self.namespace = namespace + if user is not None: + self.user = user + + @property + def cluster(self): + """Gets the cluster of this KubeconfigContext. # noqa: E501 + + + :return: The cluster of this KubeconfigContext. # noqa: E501 + :rtype: str + """ + return self._cluster + + @cluster.setter + def cluster(self, cluster): + """Sets the cluster of this KubeconfigContext. + + + :param cluster: The cluster of this KubeconfigContext. # noqa: E501 + :type: str + """ + + self._cluster = cluster + + @property + def namespace(self): + """Gets the namespace of this KubeconfigContext. # noqa: E501 + + + :return: The namespace of this KubeconfigContext. # noqa: E501 + :rtype: str + """ + return self._namespace + + @namespace.setter + def namespace(self, namespace): + """Sets the namespace of this KubeconfigContext. + + + :param namespace: The namespace of this KubeconfigContext. # noqa: E501 + :type: str + """ + + self._namespace = namespace + + @property + def user(self): + """Gets the user of this KubeconfigContext. # noqa: E501 + + + :return: The user of this KubeconfigContext. # noqa: E501 + :rtype: str + """ + return self._user + + @user.setter + def user(self, user): + """Sets the user of this KubeconfigContext. + + + :param user: The user of this KubeconfigContext. # noqa: E501 + :type: str + """ + + self._user = user + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigContext): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigContext): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_exec.py b/akeyless/models/kubeconfig_exec.py new file mode 100644 index 00000000..7336a976 --- /dev/null +++ b/akeyless/models/kubeconfig_exec.py @@ -0,0 +1,199 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigExec(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'api_version': 'str', + 'args': 'list[str]', + 'command': 'str', + 'interactive_mode': 'str' + } + + attribute_map = { + 'api_version': 'apiVersion', + 'args': 'args', + 'command': 'command', + 'interactive_mode': 'interactiveMode' + } + + def __init__(self, api_version=None, args=None, command=None, interactive_mode=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigExec - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._api_version = None + self._args = None + self._command = None + self._interactive_mode = None + self.discriminator = None + + if api_version is not None: + self.api_version = api_version + if args is not None: + self.args = args + if command is not None: + self.command = command + if interactive_mode is not None: + self.interactive_mode = interactive_mode + + @property + def api_version(self): + """Gets the api_version of this KubeconfigExec. # noqa: E501 + + + :return: The api_version of this KubeconfigExec. # noqa: E501 + :rtype: str + """ + return self._api_version + + @api_version.setter + def api_version(self, api_version): + """Sets the api_version of this KubeconfigExec. + + + :param api_version: The api_version of this KubeconfigExec. # noqa: E501 + :type: str + """ + + self._api_version = api_version + + @property + def args(self): + """Gets the args of this KubeconfigExec. # noqa: E501 + + + :return: The args of this KubeconfigExec. # noqa: E501 + :rtype: list[str] + """ + return self._args + + @args.setter + def args(self, args): + """Sets the args of this KubeconfigExec. + + + :param args: The args of this KubeconfigExec. # noqa: E501 + :type: list[str] + """ + + self._args = args + + @property + def command(self): + """Gets the command of this KubeconfigExec. # noqa: E501 + + + :return: The command of this KubeconfigExec. # noqa: E501 + :rtype: str + """ + return self._command + + @command.setter + def command(self, command): + """Sets the command of this KubeconfigExec. + + + :param command: The command of this KubeconfigExec. # noqa: E501 + :type: str + """ + + self._command = command + + @property + def interactive_mode(self): + """Gets the interactive_mode of this KubeconfigExec. # noqa: E501 + + + :return: The interactive_mode of this KubeconfigExec. # noqa: E501 + :rtype: str + """ + return self._interactive_mode + + @interactive_mode.setter + def interactive_mode(self, interactive_mode): + """Sets the interactive_mode of this KubeconfigExec. + + + :param interactive_mode: The interactive_mode of this KubeconfigExec. # noqa: E501 + :type: str + """ + + self._interactive_mode = interactive_mode + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigExec): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigExec): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_generate_output.py b/akeyless/models/kubeconfig_generate_output.py new file mode 100644 index 00000000..fe88d6bf --- /dev/null +++ b/akeyless/models/kubeconfig_generate_output.py @@ -0,0 +1,173 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigGenerateOutput(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'conflicted_clusters_names': 'list[str]', + 'data': 'KubeConfigValue', + 'errors': 'list[str]' + } + + attribute_map = { + 'conflicted_clusters_names': 'conflicted_clusters_names', + 'data': 'data', + 'errors': 'errors' + } + + def __init__(self, conflicted_clusters_names=None, data=None, errors=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigGenerateOutput - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._conflicted_clusters_names = None + self._data = None + self._errors = None + self.discriminator = None + + if conflicted_clusters_names is not None: + self.conflicted_clusters_names = conflicted_clusters_names + if data is not None: + self.data = data + if errors is not None: + self.errors = errors + + @property + def conflicted_clusters_names(self): + """Gets the conflicted_clusters_names of this KubeconfigGenerateOutput. # noqa: E501 + + + :return: The conflicted_clusters_names of this KubeconfigGenerateOutput. # noqa: E501 + :rtype: list[str] + """ + return self._conflicted_clusters_names + + @conflicted_clusters_names.setter + def conflicted_clusters_names(self, conflicted_clusters_names): + """Sets the conflicted_clusters_names of this KubeconfigGenerateOutput. + + + :param conflicted_clusters_names: The conflicted_clusters_names of this KubeconfigGenerateOutput. # noqa: E501 + :type: list[str] + """ + + self._conflicted_clusters_names = conflicted_clusters_names + + @property + def data(self): + """Gets the data of this KubeconfigGenerateOutput. # noqa: E501 + + + :return: The data of this KubeconfigGenerateOutput. # noqa: E501 + :rtype: KubeConfigValue + """ + return self._data + + @data.setter + def data(self, data): + """Sets the data of this KubeconfigGenerateOutput. + + + :param data: The data of this KubeconfigGenerateOutput. # noqa: E501 + :type: KubeConfigValue + """ + + self._data = data + + @property + def errors(self): + """Gets the errors of this KubeconfigGenerateOutput. # noqa: E501 + + + :return: The errors of this KubeconfigGenerateOutput. # noqa: E501 + :rtype: list[str] + """ + return self._errors + + @errors.setter + def errors(self, errors): + """Sets the errors of this KubeconfigGenerateOutput. + + + :param errors: The errors of this KubeconfigGenerateOutput. # noqa: E501 + :type: list[str] + """ + + self._errors = errors + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigGenerateOutput): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigGenerateOutput): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_named_cluster.py b/akeyless/models/kubeconfig_named_cluster.py new file mode 100644 index 00000000..c6f6cf1a --- /dev/null +++ b/akeyless/models/kubeconfig_named_cluster.py @@ -0,0 +1,147 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigNamedCluster(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'cluster': 'KubeconfigCluster', + 'name': 'str' + } + + attribute_map = { + 'cluster': 'cluster', + 'name': 'name' + } + + def __init__(self, cluster=None, name=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigNamedCluster - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._cluster = None + self._name = None + self.discriminator = None + + if cluster is not None: + self.cluster = cluster + if name is not None: + self.name = name + + @property + def cluster(self): + """Gets the cluster of this KubeconfigNamedCluster. # noqa: E501 + + + :return: The cluster of this KubeconfigNamedCluster. # noqa: E501 + :rtype: KubeconfigCluster + """ + return self._cluster + + @cluster.setter + def cluster(self, cluster): + """Sets the cluster of this KubeconfigNamedCluster. + + + :param cluster: The cluster of this KubeconfigNamedCluster. # noqa: E501 + :type: KubeconfigCluster + """ + + self._cluster = cluster + + @property + def name(self): + """Gets the name of this KubeconfigNamedCluster. # noqa: E501 + + + :return: The name of this KubeconfigNamedCluster. # noqa: E501 + :rtype: str + """ + return self._name + + @name.setter + def name(self, name): + """Sets the name of this KubeconfigNamedCluster. + + + :param name: The name of this KubeconfigNamedCluster. # noqa: E501 + :type: str + """ + + self._name = name + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigNamedCluster): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigNamedCluster): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_named_context.py b/akeyless/models/kubeconfig_named_context.py new file mode 100644 index 00000000..035fce88 --- /dev/null +++ b/akeyless/models/kubeconfig_named_context.py @@ -0,0 +1,147 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigNamedContext(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'context': 'KubeconfigContext', + 'name': 'str' + } + + attribute_map = { + 'context': 'context', + 'name': 'name' + } + + def __init__(self, context=None, name=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigNamedContext - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._context = None + self._name = None + self.discriminator = None + + if context is not None: + self.context = context + if name is not None: + self.name = name + + @property + def context(self): + """Gets the context of this KubeconfigNamedContext. # noqa: E501 + + + :return: The context of this KubeconfigNamedContext. # noqa: E501 + :rtype: KubeconfigContext + """ + return self._context + + @context.setter + def context(self, context): + """Sets the context of this KubeconfigNamedContext. + + + :param context: The context of this KubeconfigNamedContext. # noqa: E501 + :type: KubeconfigContext + """ + + self._context = context + + @property + def name(self): + """Gets the name of this KubeconfigNamedContext. # noqa: E501 + + + :return: The name of this KubeconfigNamedContext. # noqa: E501 + :rtype: str + """ + return self._name + + @name.setter + def name(self, name): + """Sets the name of this KubeconfigNamedContext. + + + :param name: The name of this KubeconfigNamedContext. # noqa: E501 + :type: str + """ + + self._name = name + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigNamedContext): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigNamedContext): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_user.py b/akeyless/models/kubeconfig_user.py new file mode 100644 index 00000000..df90ba14 --- /dev/null +++ b/akeyless/models/kubeconfig_user.py @@ -0,0 +1,147 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigUser(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'name': 'str', + 'user': 'KubeconfigUserExec' + } + + attribute_map = { + 'name': 'name', + 'user': 'user' + } + + def __init__(self, name=None, user=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigUser - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._name = None + self._user = None + self.discriminator = None + + if name is not None: + self.name = name + if user is not None: + self.user = user + + @property + def name(self): + """Gets the name of this KubeconfigUser. # noqa: E501 + + + :return: The name of this KubeconfigUser. # noqa: E501 + :rtype: str + """ + return self._name + + @name.setter + def name(self, name): + """Sets the name of this KubeconfigUser. + + + :param name: The name of this KubeconfigUser. # noqa: E501 + :type: str + """ + + self._name = name + + @property + def user(self): + """Gets the user of this KubeconfigUser. # noqa: E501 + + + :return: The user of this KubeconfigUser. # noqa: E501 + :rtype: KubeconfigUserExec + """ + return self._user + + @user.setter + def user(self, user): + """Sets the user of this KubeconfigUser. + + + :param user: The user of this KubeconfigUser. # noqa: E501 + :type: KubeconfigUserExec + """ + + self._user = user + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigUser): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigUser): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/kubeconfig_user_exec.py b/akeyless/models/kubeconfig_user_exec.py new file mode 100644 index 00000000..c8238be5 --- /dev/null +++ b/akeyless/models/kubeconfig_user_exec.py @@ -0,0 +1,121 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class KubeconfigUserExec(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + '_exec': 'KubeconfigExec' + } + + attribute_map = { + '_exec': 'exec' + } + + def __init__(self, _exec=None, local_vars_configuration=None): # noqa: E501 + """KubeconfigUserExec - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self.__exec = None + self.discriminator = None + + if _exec is not None: + self._exec = _exec + + @property + def _exec(self): + """Gets the _exec of this KubeconfigUserExec. # noqa: E501 + + + :return: The _exec of this KubeconfigUserExec. # noqa: E501 + :rtype: KubeconfigExec + """ + return self.__exec + + @_exec.setter + def _exec(self, _exec): + """Sets the _exec of this KubeconfigUserExec. + + + :param _exec: The _exec of this KubeconfigUserExec. # noqa: E501 + :type: KubeconfigExec + """ + + self.__exec = _exec + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, KubeconfigUserExec): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, KubeconfigUserExec): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/list_sra_sessions.py b/akeyless/models/list_sra_sessions.py new file mode 100644 index 00000000..6d6e9961 --- /dev/null +++ b/akeyless/models/list_sra_sessions.py @@ -0,0 +1,235 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class ListSRASessions(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'json': 'bool', + 'resource_type': 'list[str]', + 'status_type': 'list[str]', + 'token': 'str', + 'uid_token': 'str' + } + + attribute_map = { + 'json': 'json', + 'resource_type': 'resource-type', + 'status_type': 'status-type', + 'token': 'token', + 'uid_token': 'uid-token' + } + + def __init__(self, json=False, resource_type=None, status_type=None, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + """ListSRASessions - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._json = None + self._resource_type = None + self._status_type = None + self._token = None + self._uid_token = None + self.discriminator = None + + if json is not None: + self.json = json + if resource_type is not None: + self.resource_type = resource_type + if status_type is not None: + self.status_type = status_type + if token is not None: + self.token = token + if uid_token is not None: + self.uid_token = uid_token + + @property + def json(self): + """Gets the json of this ListSRASessions. # noqa: E501 + + Set output format to JSON # noqa: E501 + + :return: The json of this ListSRASessions. # noqa: E501 + :rtype: bool + """ + return self._json + + @json.setter + def json(self, json): + """Sets the json of this ListSRASessions. + + Set output format to JSON # noqa: E501 + + :param json: The json of this ListSRASessions. # noqa: E501 + :type: bool + """ + + self._json = json + + @property + def resource_type(self): + """Gets the resource_type of this ListSRASessions. # noqa: E501 + + session resource type. In case it is empty, all resources type will be returned. options: [mysql, k8s, ssh, mongodb, mssql, postgres, aws, eks, gke, rdp] # noqa: E501 + + :return: The resource_type of this ListSRASessions. # noqa: E501 + :rtype: list[str] + """ + return self._resource_type + + @resource_type.setter + def resource_type(self, resource_type): + """Sets the resource_type of this ListSRASessions. + + session resource type. In case it is empty, all resources type will be returned. options: [mysql, k8s, ssh, mongodb, mssql, postgres, aws, eks, gke, rdp] # noqa: E501 + + :param resource_type: The resource_type of this ListSRASessions. # noqa: E501 + :type: list[str] + """ + + self._resource_type = resource_type + + @property + def status_type(self): + """Gets the status_type of this ListSRASessions. # noqa: E501 + + session status type. In case it is empty, only active sessions will be returned. options: [connecting, connected, failed, completed, terminated] # noqa: E501 + + :return: The status_type of this ListSRASessions. # noqa: E501 + :rtype: list[str] + """ + return self._status_type + + @status_type.setter + def status_type(self, status_type): + """Sets the status_type of this ListSRASessions. + + session status type. In case it is empty, only active sessions will be returned. options: [connecting, connected, failed, completed, terminated] # noqa: E501 + + :param status_type: The status_type of this ListSRASessions. # noqa: E501 + :type: list[str] + """ + + self._status_type = status_type + + @property + def token(self): + """Gets the token of this ListSRASessions. # noqa: E501 + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :return: The token of this ListSRASessions. # noqa: E501 + :rtype: str + """ + return self._token + + @token.setter + def token(self, token): + """Sets the token of this ListSRASessions. + + Authentication token (see `/auth` and `/configure`) # noqa: E501 + + :param token: The token of this ListSRASessions. # noqa: E501 + :type: str + """ + + self._token = token + + @property + def uid_token(self): + """Gets the uid_token of this ListSRASessions. # noqa: E501 + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :return: The uid_token of this ListSRASessions. # noqa: E501 + :rtype: str + """ + return self._uid_token + + @uid_token.setter + def uid_token(self, uid_token): + """Sets the uid_token of this ListSRASessions. + + The universal identity token, Required only for universal_identity authentication # noqa: E501 + + :param uid_token: The uid_token of this ListSRASessions. # noqa: E501 + :type: str + """ + + self._uid_token = uid_token + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, ListSRASessions): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, ListSRASessions): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/list_sra_sessions_output.py b/akeyless/models/list_sra_sessions_output.py new file mode 100644 index 00000000..86b43c47 --- /dev/null +++ b/akeyless/models/list_sra_sessions_output.py @@ -0,0 +1,173 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class ListSraSessionsOutput(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'allowed_gateways': 'list[str]', + 'next_page': 'str', + 'sessions': 'list[SraSessionEntryOut]' + } + + attribute_map = { + 'allowed_gateways': 'allowed_gateways', + 'next_page': 'next_page', + 'sessions': 'sessions' + } + + def __init__(self, allowed_gateways=None, next_page=None, sessions=None, local_vars_configuration=None): # noqa: E501 + """ListSraSessionsOutput - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._allowed_gateways = None + self._next_page = None + self._sessions = None + self.discriminator = None + + if allowed_gateways is not None: + self.allowed_gateways = allowed_gateways + if next_page is not None: + self.next_page = next_page + if sessions is not None: + self.sessions = sessions + + @property + def allowed_gateways(self): + """Gets the allowed_gateways of this ListSraSessionsOutput. # noqa: E501 + + + :return: The allowed_gateways of this ListSraSessionsOutput. # noqa: E501 + :rtype: list[str] + """ + return self._allowed_gateways + + @allowed_gateways.setter + def allowed_gateways(self, allowed_gateways): + """Sets the allowed_gateways of this ListSraSessionsOutput. + + + :param allowed_gateways: The allowed_gateways of this ListSraSessionsOutput. # noqa: E501 + :type: list[str] + """ + + self._allowed_gateways = allowed_gateways + + @property + def next_page(self): + """Gets the next_page of this ListSraSessionsOutput. # noqa: E501 + + + :return: The next_page of this ListSraSessionsOutput. # noqa: E501 + :rtype: str + """ + return self._next_page + + @next_page.setter + def next_page(self, next_page): + """Sets the next_page of this ListSraSessionsOutput. + + + :param next_page: The next_page of this ListSraSessionsOutput. # noqa: E501 + :type: str + """ + + self._next_page = next_page + + @property + def sessions(self): + """Gets the sessions of this ListSraSessionsOutput. # noqa: E501 + + + :return: The sessions of this ListSraSessionsOutput. # noqa: E501 + :rtype: list[SraSessionEntryOut] + """ + return self._sessions + + @sessions.setter + def sessions(self, sessions): + """Sets the sessions of this ListSraSessionsOutput. + + + :param sessions: The sessions of this ListSraSessionsOutput. # noqa: E501 + :type: list[SraSessionEntryOut] + """ + + self._sessions = sessions + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, ListSraSessionsOutput): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, ListSraSessionsOutput): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/pki_certificate_issue_details.py b/akeyless/models/pki_certificate_issue_details.py index 9e04973b..a50bc9ec 100644 --- a/akeyless/models/pki_certificate_issue_details.py +++ b/akeyless/models/pki_certificate_issue_details.py @@ -41,6 +41,7 @@ class PKICertificateIssueDetails(object): 'allowed_domains_list': 'list[str]', 'allowed_extra_extensions': 'dict(str, list[str])', 'allowed_uri_sans': 'list[str]', + 'auto_renew_certificate': 'bool', 'basic_constraints_valid_for_non_ca': 'bool', 'certificate_authority_mode': 'str', 'client_flag': 'bool', @@ -65,6 +66,7 @@ class PKICertificateIssueDetails(object): 'postal_code': 'list[str]', 'protect_generated_certificates': 'bool', 'province': 'list[str]', + 'renew_before_expiration_in_days': 'int', 'require_cn': 'bool', 'server_flag': 'bool', 'street_address': 'list[str]' @@ -78,6 +80,7 @@ class PKICertificateIssueDetails(object): 'allowed_domains_list': 'allowed_domains_list', 'allowed_extra_extensions': 'allowed_extra_extensions', 'allowed_uri_sans': 'allowed_uri_sans', + 'auto_renew_certificate': 'auto_renew_certificate', 'basic_constraints_valid_for_non_ca': 'basic_constraints_valid_for_non_ca', 'certificate_authority_mode': 'certificate_authority_mode', 'client_flag': 'client_flag', @@ -102,12 +105,13 @@ class PKICertificateIssueDetails(object): 'postal_code': 'postal_code', 'protect_generated_certificates': 'protect_generated_certificates', 'province': 'province', + 'renew_before_expiration_in_days': 'renew_before_expiration_in_days', 'require_cn': 'require_cn', 'server_flag': 'server_flag', 'street_address': 'street_address' } - def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains_list=None, allowed_extra_extensions=None, allowed_uri_sans=None, basic_constraints_valid_for_non_ca=None, certificate_authority_mode=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, destination_path=None, enforce_hostnames=None, expiration_events=None, gw_cluster_id=None, gw_cluster_url=None, is_ca=None, key_bits=None, key_type=None, key_usage_list=None, locality=None, non_critical_key_usage=None, not_before_duration=None, organization_list=None, organization_unit_list=None, postal_code=None, protect_generated_certificates=None, province=None, require_cn=None, server_flag=None, street_address=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains_list=None, allowed_extra_extensions=None, allowed_uri_sans=None, auto_renew_certificate=None, basic_constraints_valid_for_non_ca=None, certificate_authority_mode=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, destination_path=None, enforce_hostnames=None, expiration_events=None, gw_cluster_id=None, gw_cluster_url=None, is_ca=None, key_bits=None, key_type=None, key_usage_list=None, locality=None, non_critical_key_usage=None, not_before_duration=None, organization_list=None, organization_unit_list=None, postal_code=None, protect_generated_certificates=None, province=None, renew_before_expiration_in_days=None, require_cn=None, server_flag=None, street_address=None, local_vars_configuration=None): # noqa: E501 """PKICertificateIssueDetails - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -120,6 +124,7 @@ def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_c self._allowed_domains_list = None self._allowed_extra_extensions = None self._allowed_uri_sans = None + self._auto_renew_certificate = None self._basic_constraints_valid_for_non_ca = None self._certificate_authority_mode = None self._client_flag = None @@ -144,6 +149,7 @@ def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_c self._postal_code = None self._protect_generated_certificates = None self._province = None + self._renew_before_expiration_in_days = None self._require_cn = None self._server_flag = None self._street_address = None @@ -163,6 +169,8 @@ def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_c self.allowed_extra_extensions = allowed_extra_extensions if allowed_uri_sans is not None: self.allowed_uri_sans = allowed_uri_sans + if auto_renew_certificate is not None: + self.auto_renew_certificate = auto_renew_certificate if basic_constraints_valid_for_non_ca is not None: self.basic_constraints_valid_for_non_ca = basic_constraints_valid_for_non_ca if certificate_authority_mode is not None: @@ -211,6 +219,8 @@ def __init__(self, acme_enabled=None, allow_any_name=None, allow_copy_ext_from_c self.protect_generated_certificates = protect_generated_certificates if province is not None: self.province = province + if renew_before_expiration_in_days is not None: + self.renew_before_expiration_in_days = renew_before_expiration_in_days if require_cn is not None: self.require_cn = require_cn if server_flag is not None: @@ -365,6 +375,27 @@ def allowed_uri_sans(self, allowed_uri_sans): self._allowed_uri_sans = allowed_uri_sans + @property + def auto_renew_certificate(self): + """Gets the auto_renew_certificate of this PKICertificateIssueDetails. # noqa: E501 + + + :return: The auto_renew_certificate of this PKICertificateIssueDetails. # noqa: E501 + :rtype: bool + """ + return self._auto_renew_certificate + + @auto_renew_certificate.setter + def auto_renew_certificate(self, auto_renew_certificate): + """Sets the auto_renew_certificate of this PKICertificateIssueDetails. + + + :param auto_renew_certificate: The auto_renew_certificate of this PKICertificateIssueDetails. # noqa: E501 + :type: bool + """ + + self._auto_renew_certificate = auto_renew_certificate + @property def basic_constraints_valid_for_non_ca(self): """Gets the basic_constraints_valid_for_non_ca of this PKICertificateIssueDetails. # noqa: E501 @@ -879,6 +910,27 @@ def province(self, province): self._province = province + @property + def renew_before_expiration_in_days(self): + """Gets the renew_before_expiration_in_days of this PKICertificateIssueDetails. # noqa: E501 + + + :return: The renew_before_expiration_in_days of this PKICertificateIssueDetails. # noqa: E501 + :rtype: int + """ + return self._renew_before_expiration_in_days + + @renew_before_expiration_in_days.setter + def renew_before_expiration_in_days(self, renew_before_expiration_in_days): + """Sets the renew_before_expiration_in_days of this PKICertificateIssueDetails. + + + :param renew_before_expiration_in_days: The renew_before_expiration_in_days of this PKICertificateIssueDetails. # noqa: E501 + :type: int + """ + + self._renew_before_expiration_in_days = renew_before_expiration_in_days + @property def require_cn(self): """Gets the require_cn of this PKICertificateIssueDetails. # noqa: E501 diff --git a/akeyless/models/sign_ec_dsa.py b/akeyless/models/sign_ec_dsa.py index 78bab308..c3dd96ee 100644 --- a/akeyless/models/sign_ec_dsa.py +++ b/akeyless/models/sign_ec_dsa.py @@ -34,6 +34,7 @@ class SignEcDsa(object): and the value is json key in definition. """ openapi_types = { + 'accessibility': 'str', 'display_id': 'str', 'item_id': 'int', 'json': 'bool', @@ -46,6 +47,7 @@ class SignEcDsa(object): } attribute_map = { + 'accessibility': 'accessibility', 'display_id': 'display-id', 'item_id': 'item-id', 'json': 'json', @@ -57,12 +59,13 @@ class SignEcDsa(object): 'version': 'version' } - def __init__(self, display_id=None, item_id=None, json=False, key_name=None, message=None, prehashed=None, token=None, uid_token=None, version=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, accessibility='regular', display_id=None, item_id=None, json=False, key_name=None, message=None, prehashed=None, token=None, uid_token=None, version=None, local_vars_configuration=None): # noqa: E501 """SignEcDsa - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() self.local_vars_configuration = local_vars_configuration + self._accessibility = None self._display_id = None self._item_id = None self._json = None @@ -74,6 +77,8 @@ def __init__(self, display_id=None, item_id=None, json=False, key_name=None, mes self._version = None self.discriminator = None + if accessibility is not None: + self.accessibility = accessibility if display_id is not None: self.display_id = display_id if item_id is not None: @@ -92,6 +97,29 @@ def __init__(self, display_id=None, item_id=None, json=False, key_name=None, mes if version is not None: self.version = version + @property + def accessibility(self): + """Gets the accessibility of this SignEcDsa. # noqa: E501 + + for personal password manager # noqa: E501 + + :return: The accessibility of this SignEcDsa. # noqa: E501 + :rtype: str + """ + return self._accessibility + + @accessibility.setter + def accessibility(self, accessibility): + """Sets the accessibility of this SignEcDsa. + + for personal password manager # noqa: E501 + + :param accessibility: The accessibility of this SignEcDsa. # noqa: E501 + :type: str + """ + + self._accessibility = accessibility + @property def display_id(self): """Gets the display_id of this SignEcDsa. # noqa: E501 diff --git a/akeyless/models/sra_session_entry_out.py b/akeyless/models/sra_session_entry_out.py new file mode 100644 index 00000000..2b479c36 --- /dev/null +++ b/akeyless/models/sra_session_entry_out.py @@ -0,0 +1,485 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +import pprint +import re # noqa: F401 + +import six + +from akeyless.configuration import Configuration + + +class SraSessionEntryOut(object): + """NOTE: This class is auto generated by OpenAPI Generator. + Ref: https://openapi-generator.tech + + Do not edit the class manually. + """ + + """ + Attributes: + openapi_types (dict): The key is attribute name + and the value is attribute type. + attribute_map (dict): The key is attribute name + and the value is json key in definition. + """ + openapi_types = { + 'access_id': 'str', + 'client_type': 'str', + 'cluster_unique_id': 'int', + 'connection_type': 'str', + 'end_time': 'datetime', + 'error_msg': 'str', + 'gateway_name': 'str', + 'instance_id': 'str', + 'secret_name': 'str', + 'session_id': 'str', + 'start_time': 'datetime', + 'status': 'str', + 'target_host': 'str', + 'ttl': 'str', + 'user_identifier': 'str' + } + + attribute_map = { + 'access_id': 'access_id', + 'client_type': 'client_type', + 'cluster_unique_id': 'cluster_unique_id', + 'connection_type': 'connection_type', + 'end_time': 'end_time', + 'error_msg': 'error_msg', + 'gateway_name': 'gateway_name', + 'instance_id': 'instance_id', + 'secret_name': 'secret_name', + 'session_id': 'session_id', + 'start_time': 'start_time', + 'status': 'status', + 'target_host': 'target_host', + 'ttl': 'ttl', + 'user_identifier': 'user_identifier' + } + + def __init__(self, access_id=None, client_type=None, cluster_unique_id=None, connection_type=None, end_time=None, error_msg=None, gateway_name=None, instance_id=None, secret_name=None, session_id=None, start_time=None, status=None, target_host=None, ttl=None, user_identifier=None, local_vars_configuration=None): # noqa: E501 + """SraSessionEntryOut - a model defined in OpenAPI""" # noqa: E501 + if local_vars_configuration is None: + local_vars_configuration = Configuration() + self.local_vars_configuration = local_vars_configuration + + self._access_id = None + self._client_type = None + self._cluster_unique_id = None + self._connection_type = None + self._end_time = None + self._error_msg = None + self._gateway_name = None + self._instance_id = None + self._secret_name = None + self._session_id = None + self._start_time = None + self._status = None + self._target_host = None + self._ttl = None + self._user_identifier = None + self.discriminator = None + + if access_id is not None: + self.access_id = access_id + if client_type is not None: + self.client_type = client_type + if cluster_unique_id is not None: + self.cluster_unique_id = cluster_unique_id + if connection_type is not None: + self.connection_type = connection_type + if end_time is not None: + self.end_time = end_time + if error_msg is not None: + self.error_msg = error_msg + if gateway_name is not None: + self.gateway_name = gateway_name + if instance_id is not None: + self.instance_id = instance_id + if secret_name is not None: + self.secret_name = secret_name + if session_id is not None: + self.session_id = session_id + if start_time is not None: + self.start_time = start_time + if status is not None: + self.status = status + if target_host is not None: + self.target_host = target_host + if ttl is not None: + self.ttl = ttl + if user_identifier is not None: + self.user_identifier = user_identifier + + @property + def access_id(self): + """Gets the access_id of this SraSessionEntryOut. # noqa: E501 + + + :return: The access_id of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._access_id + + @access_id.setter + def access_id(self, access_id): + """Sets the access_id of this SraSessionEntryOut. + + + :param access_id: The access_id of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._access_id = access_id + + @property + def client_type(self): + """Gets the client_type of this SraSessionEntryOut. # noqa: E501 + + + :return: The client_type of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._client_type + + @client_type.setter + def client_type(self, client_type): + """Sets the client_type of this SraSessionEntryOut. + + + :param client_type: The client_type of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._client_type = client_type + + @property + def cluster_unique_id(self): + """Gets the cluster_unique_id of this SraSessionEntryOut. # noqa: E501 + + + :return: The cluster_unique_id of this SraSessionEntryOut. # noqa: E501 + :rtype: int + """ + return self._cluster_unique_id + + @cluster_unique_id.setter + def cluster_unique_id(self, cluster_unique_id): + """Sets the cluster_unique_id of this SraSessionEntryOut. + + + :param cluster_unique_id: The cluster_unique_id of this SraSessionEntryOut. # noqa: E501 + :type: int + """ + + self._cluster_unique_id = cluster_unique_id + + @property + def connection_type(self): + """Gets the connection_type of this SraSessionEntryOut. # noqa: E501 + + + :return: The connection_type of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._connection_type + + @connection_type.setter + def connection_type(self, connection_type): + """Sets the connection_type of this SraSessionEntryOut. + + + :param connection_type: The connection_type of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._connection_type = connection_type + + @property + def end_time(self): + """Gets the end_time of this SraSessionEntryOut. # noqa: E501 + + + :return: The end_time of this SraSessionEntryOut. # noqa: E501 + :rtype: datetime + """ + return self._end_time + + @end_time.setter + def end_time(self, end_time): + """Sets the end_time of this SraSessionEntryOut. + + + :param end_time: The end_time of this SraSessionEntryOut. # noqa: E501 + :type: datetime + """ + + self._end_time = end_time + + @property + def error_msg(self): + """Gets the error_msg of this SraSessionEntryOut. # noqa: E501 + + + :return: The error_msg of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._error_msg + + @error_msg.setter + def error_msg(self, error_msg): + """Sets the error_msg of this SraSessionEntryOut. + + + :param error_msg: The error_msg of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._error_msg = error_msg + + @property + def gateway_name(self): + """Gets the gateway_name of this SraSessionEntryOut. # noqa: E501 + + + :return: The gateway_name of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._gateway_name + + @gateway_name.setter + def gateway_name(self, gateway_name): + """Sets the gateway_name of this SraSessionEntryOut. + + + :param gateway_name: The gateway_name of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._gateway_name = gateway_name + + @property + def instance_id(self): + """Gets the instance_id of this SraSessionEntryOut. # noqa: E501 + + + :return: The instance_id of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._instance_id + + @instance_id.setter + def instance_id(self, instance_id): + """Sets the instance_id of this SraSessionEntryOut. + + + :param instance_id: The instance_id of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._instance_id = instance_id + + @property + def secret_name(self): + """Gets the secret_name of this SraSessionEntryOut. # noqa: E501 + + + :return: The secret_name of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._secret_name + + @secret_name.setter + def secret_name(self, secret_name): + """Sets the secret_name of this SraSessionEntryOut. + + + :param secret_name: The secret_name of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._secret_name = secret_name + + @property + def session_id(self): + """Gets the session_id of this SraSessionEntryOut. # noqa: E501 + + + :return: The session_id of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._session_id + + @session_id.setter + def session_id(self, session_id): + """Sets the session_id of this SraSessionEntryOut. + + + :param session_id: The session_id of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._session_id = session_id + + @property + def start_time(self): + """Gets the start_time of this SraSessionEntryOut. # noqa: E501 + + + :return: The start_time of this SraSessionEntryOut. # noqa: E501 + :rtype: datetime + """ + return self._start_time + + @start_time.setter + def start_time(self, start_time): + """Sets the start_time of this SraSessionEntryOut. + + + :param start_time: The start_time of this SraSessionEntryOut. # noqa: E501 + :type: datetime + """ + + self._start_time = start_time + + @property + def status(self): + """Gets the status of this SraSessionEntryOut. # noqa: E501 + + + :return: The status of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._status + + @status.setter + def status(self, status): + """Sets the status of this SraSessionEntryOut. + + + :param status: The status of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._status = status + + @property + def target_host(self): + """Gets the target_host of this SraSessionEntryOut. # noqa: E501 + + + :return: The target_host of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._target_host + + @target_host.setter + def target_host(self, target_host): + """Sets the target_host of this SraSessionEntryOut. + + + :param target_host: The target_host of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._target_host = target_host + + @property + def ttl(self): + """Gets the ttl of this SraSessionEntryOut. # noqa: E501 + + + :return: The ttl of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._ttl + + @ttl.setter + def ttl(self, ttl): + """Sets the ttl of this SraSessionEntryOut. + + + :param ttl: The ttl of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._ttl = ttl + + @property + def user_identifier(self): + """Gets the user_identifier of this SraSessionEntryOut. # noqa: E501 + + + :return: The user_identifier of this SraSessionEntryOut. # noqa: E501 + :rtype: str + """ + return self._user_identifier + + @user_identifier.setter + def user_identifier(self, user_identifier): + """Sets the user_identifier of this SraSessionEntryOut. + + + :param user_identifier: The user_identifier of this SraSessionEntryOut. # noqa: E501 + :type: str + """ + + self._user_identifier = user_identifier + + def to_dict(self): + """Returns the model properties as a dict""" + result = {} + + for attr, _ in six.iteritems(self.openapi_types): + value = getattr(self, attr) + if isinstance(value, list): + result[attr] = list(map( + lambda x: x.to_dict() if hasattr(x, "to_dict") else x, + value + )) + elif hasattr(value, "to_dict"): + result[attr] = value.to_dict() + elif isinstance(value, dict): + result[attr] = dict(map( + lambda item: (item[0], item[1].to_dict()) + if hasattr(item[1], "to_dict") else item, + value.items() + )) + else: + result[attr] = value + + return result + + def to_str(self): + """Returns the string representation of the model""" + return pprint.pformat(self.to_dict()) + + def __repr__(self): + """For `print` and `pprint`""" + return self.to_str() + + def __eq__(self, other): + """Returns true if both objects are equal""" + if not isinstance(other, SraSessionEntryOut): + return False + + return self.to_dict() == other.to_dict() + + def __ne__(self, other): + """Returns true if both objects are not equal""" + if not isinstance(other, SraSessionEntryOut): + return True + + return self.to_dict() != other.to_dict() diff --git a/akeyless/models/update_pki_cert_issuer.py b/akeyless/models/update_pki_cert_issuer.py index 0a89999e..fc167f74 100644 --- a/akeyless/models/update_pki_cert_issuer.py +++ b/akeyless/models/update_pki_cert_issuer.py @@ -41,6 +41,7 @@ class UpdatePKICertIssuer(object): 'allowed_domains': 'str', 'allowed_extra_extensions': 'str', 'allowed_uri_sans': 'str', + 'auto_renew': 'bool', 'client_flag': 'bool', 'code_signing_flag': 'bool', 'country': 'str', @@ -68,6 +69,7 @@ class UpdatePKICertIssuer(object): 'protect_certificates': 'bool', 'province': 'str', 'rm_tag': 'list[str]', + 'scheduled_renew': 'int', 'server_flag': 'bool', 'signer_key_name': 'str', 'street_address': 'str', @@ -84,6 +86,7 @@ class UpdatePKICertIssuer(object): 'allowed_domains': 'allowed-domains', 'allowed_extra_extensions': 'allowed-extra-extensions', 'allowed_uri_sans': 'allowed-uri-sans', + 'auto_renew': 'auto-renew', 'client_flag': 'client-flag', 'code_signing_flag': 'code-signing-flag', 'country': 'country', @@ -111,6 +114,7 @@ class UpdatePKICertIssuer(object): 'protect_certificates': 'protect-certificates', 'province': 'province', 'rm_tag': 'rm-tag', + 'scheduled_renew': 'scheduled-renew', 'server_flag': 'server-flag', 'signer_key_name': 'signer-key-name', 'street_address': 'street-address', @@ -119,7 +123,7 @@ class UpdatePKICertIssuer(object): 'uid_token': 'uid-token' } - def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, critical_key_usage='true', delete_protection=None, description=None, destination_path=None, enable_acme=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, new_name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, rm_tag=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 + def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=None, allow_subdomains=None, allowed_domains=None, allowed_extra_extensions=None, allowed_uri_sans=None, auto_renew=None, client_flag=None, code_signing_flag=None, country=None, create_private_crl=None, create_public_crl=None, critical_key_usage='true', delete_protection=None, description=None, destination_path=None, enable_acme=None, expiration_event_in=None, gw_cluster_url=None, is_ca=None, json=False, key_usage='DigitalSignature,KeyAgreement,KeyEncipherment', locality=None, metadata=None, name=None, new_name=None, not_enforce_hostnames=None, not_require_cn=None, organizational_units=None, organizations=None, postal_code=None, protect_certificates=None, province=None, rm_tag=None, scheduled_renew=None, server_flag=None, signer_key_name='dummy_signer_key', street_address=None, token=None, ttl=None, uid_token=None, local_vars_configuration=None): # noqa: E501 """UpdatePKICertIssuer - a model defined in OpenAPI""" # noqa: E501 if local_vars_configuration is None: local_vars_configuration = Configuration() @@ -132,6 +136,7 @@ def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=No self._allowed_domains = None self._allowed_extra_extensions = None self._allowed_uri_sans = None + self._auto_renew = None self._client_flag = None self._code_signing_flag = None self._country = None @@ -159,6 +164,7 @@ def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=No self._protect_certificates = None self._province = None self._rm_tag = None + self._scheduled_renew = None self._server_flag = None self._signer_key_name = None self._street_address = None @@ -181,6 +187,8 @@ def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=No self.allowed_extra_extensions = allowed_extra_extensions if allowed_uri_sans is not None: self.allowed_uri_sans = allowed_uri_sans + if auto_renew is not None: + self.auto_renew = auto_renew if client_flag is not None: self.client_flag = client_flag if code_signing_flag is not None: @@ -234,6 +242,8 @@ def __init__(self, add_tag=None, allow_any_name=None, allow_copy_ext_from_csr=No self.province = province if rm_tag is not None: self.rm_tag = rm_tag + if scheduled_renew is not None: + self.scheduled_renew = scheduled_renew if server_flag is not None: self.server_flag = server_flag self.signer_key_name = signer_key_name @@ -406,6 +416,29 @@ def allowed_uri_sans(self, allowed_uri_sans): self._allowed_uri_sans = allowed_uri_sans + @property + def auto_renew(self): + """Gets the auto_renew of this UpdatePKICertIssuer. # noqa: E501 + + Automatically renew certificates before expiration # noqa: E501 + + :return: The auto_renew of this UpdatePKICertIssuer. # noqa: E501 + :rtype: bool + """ + return self._auto_renew + + @auto_renew.setter + def auto_renew(self, auto_renew): + """Sets the auto_renew of this UpdatePKICertIssuer. + + Automatically renew certificates before expiration # noqa: E501 + + :param auto_renew: The auto_renew of this UpdatePKICertIssuer. # noqa: E501 + :type: bool + """ + + self._auto_renew = auto_renew + @property def client_flag(self): """Gets the client_flag of this UpdatePKICertIssuer. # noqa: E501 @@ -1029,6 +1062,29 @@ def rm_tag(self, rm_tag): self._rm_tag = rm_tag + @property + def scheduled_renew(self): + """Gets the scheduled_renew of this UpdatePKICertIssuer. # noqa: E501 + + Number of days before expiration to renew certificates # noqa: E501 + + :return: The scheduled_renew of this UpdatePKICertIssuer. # noqa: E501 + :rtype: int + """ + return self._scheduled_renew + + @scheduled_renew.setter + def scheduled_renew(self, scheduled_renew): + """Sets the scheduled_renew of this UpdatePKICertIssuer. + + Number of days before expiration to renew certificates # noqa: E501 + + :param scheduled_renew: The scheduled_renew of this UpdatePKICertIssuer. # noqa: E501 + :type: int + """ + + self._scheduled_renew = scheduled_renew + @property def server_flag(self): """Gets the server_flag of this UpdatePKICertIssuer. # noqa: E501 diff --git a/docs/AkeylessGatewayConfig.md b/docs/AkeylessGatewayConfig.md index c9c751aa..d2171b8f 100644 --- a/docs/AkeylessGatewayConfig.md +++ b/docs/AkeylessGatewayConfig.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **config_protection_key_name** | **str** | | [optional] **general** | [**GeneralConfigPart**](GeneralConfigPart.md) | | [optional] **k8s_auths** | [**K8SAuthsConfigPart**](K8SAuthsConfigPart.md) | | [optional] +**kerberos** | [**KerberosConfigPart**](KerberosConfigPart.md) | | [optional] **kmip_clients** | [**KMIPConfigPart**](KMIPConfigPart.md) | | [optional] **ldap** | [**LdapConfigPart**](LdapConfigPart.md) | | [optional] **leadership** | [**LeadershipConfigPart**](LeadershipConfigPart.md) | | [optional] diff --git a/docs/Auth.md b/docs/Auth.md index 56b2fb21..19b1e7d5 100644 --- a/docs/Auth.md +++ b/docs/Auth.md @@ -12,13 +12,18 @@ Name | Type | Description | Notes **cert_data** | **str** | Certificate data encoded in base64. Used if file was not provided. (relevant only for access-type=cert) | [optional] **cloud_id** | **str** | The cloud identity (relevant only for access-type=azure_ad,aws_iam,gcp) | [optional] **debug** | **bool** | | [optional] +**disable_pafxfast** | **str** | Disable the FAST negotiation in the Kerberos authentication method | [optional] +**gateway_spn** | **str** | The service principal name of the gateway as registered in LDAP (i.e., HTTP/gateway) | [optional] **gateway_url** | **str** | Gateway URL relevant only for access-type=k8s/oauth2/saml/oidc | [optional] **gcp_audience** | **str** | GCP JWT audience | [optional] [default to 'akeyless.io'] **json** | **bool** | Set output format to JSON | [optional] [default to False] **jwt** | **str** | The Json Web Token (relevant only for access-type=jwt/oidc) | [optional] **k8s_auth_config_name** | **str** | The K8S Auth config name (relevant only for access-type=k8s) | [optional] **k8s_service_account_token** | **str** | The K8S service account token. (relevant only for access-type=k8s) | [optional] +**kerberos_username** | **str** | TThe username for the entry within the keytab to authenticate via Kerberos | [optional] **key_data** | **str** | Private key data encoded in base64. Used if file was not provided.(relevant only for access-type=cert) | [optional] +**keytab_data** | **str** | Base64-encoded content of a valid keytab file, containing the service account's entry. | [optional] +**krb5_conf_data** | **str** | Base64-encoded content of a valid krb5.conf file, specifying the settings and parameters required for Kerberos authentication. | [optional] **ldap_password** | **str** | LDAP password (relevant only for access-type=ldap) | [optional] **ldap_username** | **str** | LDAP username (relevant only for access-type=ldap) | [optional] **oci_auth_type** | **str** | The type of the OCI configuration to use [instance/apikey/resource] (relevant only for access-type=oci) | [optional] [default to 'apikey'] diff --git a/docs/AuthMethod.md b/docs/AuthMethod.md index 653ad1a6..2a9864ee 100644 --- a/docs/AuthMethod.md +++ b/docs/AuthMethod.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **account_id** | **str** | | [optional] **associated_gw_ids** | **list[int]** | | [optional] **auth_method_access_id** | **str** | | [optional] +**auth_method_additional_data** | [**AuthMethodAdditionalData**](AuthMethodAdditionalData.md) | | [optional] **auth_method_name** | **str** | | [optional] **auth_method_roles_assoc** | [**list[AuthMethodRoleAssociation]**](AuthMethodRoleAssociation.md) | | [optional] **client_permissions** | **list[str]** | | [optional] diff --git a/docs/AuthMethodAccessInfo.md b/docs/AuthMethodAccessInfo.md index 784c5b38..e634ce8e 100644 --- a/docs/AuthMethodAccessInfo.md +++ b/docs/AuthMethodAccessInfo.md @@ -18,6 +18,7 @@ Name | Type | Description | Notes **huawei_access_rules** | [**HuaweiAccessRules**](HuaweiAccessRules.md) | | [optional] **jwt_ttl** | **int** | | [optional] **k8s_access_rules** | [**KubernetesAccessRules**](KubernetesAccessRules.md) | | [optional] +**kerberos_access_rules** | [**KerberosAccessRules**](KerberosAccessRules.md) | | [optional] **ldap_access_rules** | [**LDAPAccessRules**](LDAPAccessRules.md) | | [optional] **oauth2_access_rules** | [**OAuth2AccessRules**](OAuth2AccessRules.md) | | [optional] **oci_access_rules** | [**OCIAccessRules**](OCIAccessRules.md) | | [optional] diff --git a/docs/AuthMethodAdditionalData.md b/docs/AuthMethodAdditionalData.md new file mode 100644 index 00000000..f3bb74de --- /dev/null +++ b/docs/AuthMethodAdditionalData.md @@ -0,0 +1,10 @@ +# AuthMethodAdditionalData + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**kerberos_data** | [**KerberosAuthMethodInfo**](KerberosAuthMethodInfo.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AuthMethodCreateKerberos.md b/docs/AuthMethodCreateKerberos.md new file mode 100644 index 00000000..ea904601 --- /dev/null +++ b/docs/AuthMethodCreateKerberos.md @@ -0,0 +1,39 @@ +# AuthMethodCreateKerberos + +authMethodCreateKerberos is a command that creates a new auth method that will be able to authenticate using Kerberos +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**access_expires** | **int** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0] +**audit_logs_claims** | **list[str]** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] +**bind_dn** | **str** | | [optional] +**bind_dn_password** | **str** | | [optional] +**bound_ips** | **list[str]** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**delete_protection** | **str** | Protection from accidental deletion of this object [true/false] | [optional] +**description** | **str** | Auth Method description | [optional] +**force_sub_claims** | **bool** | if true: enforce role-association must include sub claims | [optional] +**group_attr** | **str** | | [optional] +**group_dn** | **str** | | [optional] +**group_filter** | **str** | | [optional] +**gw_bound_ips** | **list[str]** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**jwt_ttl** | **int** | Jwt TTL | [optional] [default to 0] +**keytab_file_data** | **str** | | [optional] +**keytab_file_path** | **str** | | [optional] +**krb5_conf_data** | **str** | | [optional] +**krb5_conf_path** | **str** | | [optional] +**ldap_anonymous_search** | **bool** | | [optional] +**ldap_ca_cert** | **str** | | [optional] +**ldap_url** | **str** | | [optional] +**name** | **str** | Auth Method name | +**product_type** | **list[str]** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] +**subclaims_delimiters** | **list[str]** | A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) | [optional] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] +**unique_identifier** | **str** | A unique identifier (ID) value which is a \"sub claim\" name that contains details uniquely identifying that resource. This \"sub claim\" is used to distinguish between different identities. | [optional] +**user_attribute** | **str** | | [optional] +**user_dn** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/AuthMethodUpdateKerberos.md b/docs/AuthMethodUpdateKerberos.md new file mode 100644 index 00000000..93422970 --- /dev/null +++ b/docs/AuthMethodUpdateKerberos.md @@ -0,0 +1,40 @@ +# AuthMethodUpdateKerberos + +authMethodUpdateKerberos is a command that updates an auth method that will be able to authenticate using Kerberos +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**access_expires** | **int** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0] +**audit_logs_claims** | **list[str]** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] +**bind_dn** | **str** | | [optional] +**bind_dn_password** | **str** | | [optional] +**bound_ips** | **list[str]** | A CIDR whitelist with the IPs that the access is restricted to | [optional] +**delete_protection** | **str** | Protection from accidental deletion of this object [true/false] | [optional] +**description** | **str** | Auth Method description | [optional] +**force_sub_claims** | **bool** | if true: enforce role-association must include sub claims | [optional] +**group_attr** | **str** | | [optional] +**group_dn** | **str** | | [optional] +**group_filter** | **str** | | [optional] +**gw_bound_ips** | **list[str]** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**jwt_ttl** | **int** | Jwt TTL | [optional] [default to 0] +**keytab_file_data** | **str** | | [optional] +**keytab_file_path** | **str** | | [optional] +**krb5_conf_data** | **str** | | [optional] +**krb5_conf_path** | **str** | | [optional] +**ldap_anonymous_search** | **bool** | | [optional] +**ldap_ca_cert** | **str** | | [optional] +**ldap_url** | **str** | | [optional] +**name** | **str** | Auth Method name | +**new_name** | **str** | | [optional] +**product_type** | **list[str]** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] +**subclaims_delimiters** | **list[str]** | A list of additional sub claims delimiters (relevant only for SAML, OIDC, OAuth2/JWT) | [optional] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] +**unique_identifier** | **str** | A unique identifier (ID) value which is a \"sub claim\" name that contains details uniquely identifying that resource. This \"sub claim\" is used to distinguish between different identities. | [optional] +**user_attribute** | **str** | | [optional] +**user_dn** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/CacheConfigPart.md b/docs/CacheConfigPart.md index d369f165..a32a3a38 100644 --- a/docs/CacheConfigPart.md +++ b/docs/CacheConfigPart.md @@ -4,6 +4,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cache_enable** | **bool** | | [optional] +**cache_encryption_key** | **str** | | [optional] **cache_ttl** | **str** | | [optional] **new_proactive_cache_enable** | **bool** | | [optional] **proactive_cache_dump_interval** | **str** | | [optional] diff --git a/docs/CertificateChainInfo.md b/docs/CertificateChainInfo.md index 6088f4c0..9cf36eca 100644 --- a/docs/CertificateChainInfo.md +++ b/docs/CertificateChainInfo.md @@ -3,6 +3,7 @@ ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**auto_renew_certificate** | **bool** | | [optional] **certificate_chain** | [**list[CertificateInfo]**](CertificateInfo.md) | | [optional] **certificate_format** | **str** | | [optional] **certificate_has_private_key** | **bool** | | [optional] @@ -11,7 +12,9 @@ Name | Type | Description | Notes **certificate_issuer_name** | **str** | | [optional] **certificate_pem** | **str** | | [optional] **certificate_status** | **str** | | [optional] +**error_message** | **str** | | [optional] **expiration_events** | [**list[CertificateExpirationEvent]**](CertificateExpirationEvent.md) | | [optional] +**renew_before_expiration_in_days** | **int** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/ClassicKeyDetailsInfo.md b/docs/ClassicKeyDetailsInfo.md index c7c5cd22..0937d8b0 100644 --- a/docs/ClassicKeyDetailsInfo.md +++ b/docs/ClassicKeyDetailsInfo.md @@ -5,6 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **classic_key_attributes** | **dict(str, list[str])** | | [optional] **classic_key_id** | **str** | | [optional] +**credential_id** | **str** | | [optional] **gw_cluster_id** | **int** | | [optional] **has_certificate** | **bool** | | [optional] **is_provided_by_user** | **bool** | | [optional] @@ -16,6 +17,8 @@ Name | Type | Description | Notes **target_alias_helper** | **str** | | [optional] **target_types** | **list[str]** | | [optional] **targets** | [**list[ClassicKeyTargetInfo]**](ClassicKeyTargetInfo.md) | | [optional] +**username** | **str** | | [optional] +**websites** | **list[str]** | | [optional] [[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) diff --git a/docs/Configure.md b/docs/Configure.md index d5729e2f..0e8fa4ee 100644 --- a/docs/Configure.md +++ b/docs/Configure.md @@ -14,10 +14,15 @@ Name | Type | Description | Notes **cert_issuer_name** | **str** | Certificate Issuer Name | [optional] **cert_username** | **str** | The username to sign in the SSH certificate (use a comma-separated list for more than one username) | [optional] **default_location_prefix** | **str** | Default path prefix for name of items, targets and auth methods | [optional] +**disable_pafxfast** | **str** | Disable the FAST negotiation in the Kerberos authentication method | [optional] +**gateway_spn** | **str** | The service principal name of the gateway as registered in LDAP (i.e., HTTP/gateway) | [optional] **gcp_audience** | **str** | GCP JWT audience | [optional] [default to 'akeyless.io'] **json** | **bool** | Set output format to JSON | [optional] [default to False] **k8s_auth_config_name** | **str** | The K8S Auth config name (relevant only for access-type=k8s) | [optional] +**kerberos_username** | **str** | TThe username for the entry within the keytab to authenticate via Kerberos | [optional] **key_data** | **str** | Private key data encoded in base64. Used if file was not provided.(relevant only for access-type=cert in Curl Context) | [optional] +**keytab_data** | **str** | Base64-encoded content of a valid keytab file, containing the service account's entry. | [optional] +**krb5_conf_data** | **str** | Base64-encoded content of a valid krb5.conf file, specifying the settings and parameters required for Kerberos authentication. | [optional] **legacy_signing_alg_name** | **bool** | Set this option to output legacy ('ssh-rsa-cert-v01@openssh.com') signing algorithm name in the certificate. | [optional] **oci_auth_type** | **str** | The type of the OCI configuration to use [instance/apikey/resource] (relevant only for access-type=oci) | [optional] [default to 'apikey'] **oci_group_ocid** | **list[str]** | A list of Oracle Cloud IDs groups (relevant only for access-type=oci) | [optional] diff --git a/docs/CreatePKICertIssuer.md b/docs/CreatePKICertIssuer.md index d217f980..a24af3d1 100644 --- a/docs/CreatePKICertIssuer.md +++ b/docs/CreatePKICertIssuer.md @@ -9,6 +9,7 @@ Name | Type | Description | Notes **allowed_domains** | **str** | A list of the allowed domains that clients can request to be included in the certificate (in a comma-delimited list) | [optional] **allowed_extra_extensions** | **str** | A json string containing the allowed extra extensions for the pki cert issuer | [optional] **allowed_uri_sans** | **str** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] +**auto_renew** | **bool** | Automatically renew certificates before expiration | [optional] **ca_target** | **str** | The name of an existing CA target to attach this PKI Certificate Issuer to, required in Public CA mode | [optional] **client_flag** | **bool** | If set, certificates will be flagged for client auth use | [optional] **code_signing_flag** | **bool** | If set, certificates will be flagged for code signing use | [optional] @@ -35,6 +36,7 @@ Name | Type | Description | Notes **postal_code** | **str** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] **protect_certificates** | **bool** | Whether to protect generated certificates from deletion | [optional] **province** | **str** | A comma-separated list of provinces that will be set in the issued certificate | [optional] +**scheduled_renew** | **int** | Number of days before expiration to renew certificates | [optional] **server_flag** | **bool** | If set, certificates will be flagged for server auth use | [optional] **signer_key_name** | **str** | A key to sign the certificate with, required in Private CA mode | [default to 'dummy_signer_key'] **street_address** | **str** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] diff --git a/docs/CreatePasskey.md b/docs/CreatePasskey.md new file mode 100644 index 00000000..96adda3d --- /dev/null +++ b/docs/CreatePasskey.md @@ -0,0 +1,22 @@ +# CreatePasskey + +CreatePasskey is a command that creates a new passkey +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**accessibility** | **str** | for personal password manager | [optional] [default to 'regular'] +**alg** | **str** | Passkey type; options: [EC256, EC384, EC512] | [default to 'EC256'] +**delete_protection** | **str** | Protection from accidental deletion of this object [true/false] | [optional] +**description** | **str** | Description of the object | [optional] +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**name** | **str** | ClassicKey name | +**origin_url** | **list[str]** | Originating websites for this passkey | [optional] +**protection_key_name** | **str** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] +**tags** | **list[str]** | Add tags attached to this object | [optional] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] +**username** | **str** | For Password Management use | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/CreatePasskeyOutput.md b/docs/CreatePasskeyOutput.md new file mode 100644 index 00000000..f7636744 --- /dev/null +++ b/docs/CreatePasskeyOutput.md @@ -0,0 +1,13 @@ +# CreatePasskeyOutput + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**classic_key_id** | **str** | | [optional] +**classic_key_name** | **str** | | [optional] +**classic_key_type** | **str** | | [optional] +**public_key** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/EventForwarderCreateEmail.md b/docs/EventForwarderCreateEmail.md index 3573f2bd..76da4920 100644 --- a/docs/EventForwarderCreateEmail.md +++ b/docs/EventForwarderCreateEmail.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes **auth_methods_event_source_locations** | **list[str]** | Auth Method Event sources | [optional] **description** | **str** | Description of the object | [optional] **email_to** | **str** | A comma seperated list of email addresses to send event to | [optional] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **every** | **str** | Rate of periodic runner repetition in hours | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **include_error** | **str** | Set this option to include event errors details [true/false] | [optional] diff --git a/docs/EventForwarderCreateServiceNow.md b/docs/EventForwarderCreateServiceNow.md index fb6a3c54..b54f2b93 100644 --- a/docs/EventForwarderCreateServiceNow.md +++ b/docs/EventForwarderCreateServiceNow.md @@ -12,7 +12,7 @@ Name | Type | Description | Notes **client_id** | **str** | The client ID to use when connecting with jwt authentication | [optional] **client_secret** | **str** | The client secret to use when connecting with jwt authentication | [optional] **description** | **str** | Description of the object | [optional] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **every** | **str** | Rate of periodic runner repetition in hours | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **host** | **str** | Workstation Host | [optional] diff --git a/docs/EventForwarderCreateSlack.md b/docs/EventForwarderCreateSlack.md index 90d604ea..7368f907 100644 --- a/docs/EventForwarderCreateSlack.md +++ b/docs/EventForwarderCreateSlack.md @@ -6,7 +6,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **auth_methods_event_source_locations** | **list[str]** | Auth Method Event sources | [optional] **description** | **str** | Description of the object | [optional] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **every** | **str** | Rate of periodic runner repetition in hours | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **items_event_source_locations** | **list[str]** | Items Event sources | [optional] diff --git a/docs/EventForwarderCreateWebhook.md b/docs/EventForwarderCreateWebhook.md index 47c5cf10..d95e78df 100644 --- a/docs/EventForwarderCreateWebhook.md +++ b/docs/EventForwarderCreateWebhook.md @@ -6,10 +6,10 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **auth_methods_event_source_locations** | **list[str]** | Auth Method Event sources | [optional] **auth_token** | **str** | Base64 encoded Token string for authentication type Token | [optional] -**auth_type** | **str** | The Webhook authentication type [user-pass, token, certificate] | [optional] [default to 'user-pass'] +**auth_type** | **str** | The Webhook authentication type [user-pass, bearer-token, certificate] | [optional] [default to 'user-pass'] **client_cert_data** | **str** | Base64 encoded PEM certificate, relevant for certificate auth-type | [optional] **description** | **str** | Description of the object | [optional] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **every** | **str** | Rate of periodic runner repetition in hours | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **items_event_source_locations** | **list[str]** | Items Event sources | [optional] diff --git a/docs/EventForwarderUpdateEmail.md b/docs/EventForwarderUpdateEmail.md index 4046e6c0..f891fcc5 100644 --- a/docs/EventForwarderUpdateEmail.md +++ b/docs/EventForwarderUpdateEmail.md @@ -8,7 +8,7 @@ Name | Type | Description | Notes **description** | **str** | Description of the object | [optional] **email_to** | **str** | A comma seperated list of email addresses to send event to | [optional] **enable** | **str** | Enable/Disable Event Forwarder [true/false] | [optional] [default to 'true'] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **include_error** | **str** | Set this option to include event errors details [true/false] | [optional] **items_event_source_locations** | **list[str]** | Items Event sources | [optional] diff --git a/docs/EventForwarderUpdateServiceNow.md b/docs/EventForwarderUpdateServiceNow.md index 8c7a6af5..84223f45 100644 --- a/docs/EventForwarderUpdateServiceNow.md +++ b/docs/EventForwarderUpdateServiceNow.md @@ -13,7 +13,7 @@ Name | Type | Description | Notes **client_secret** | **str** | The client secret to use when connecting with jwt authentication | [optional] **description** | **str** | Description of the object | [optional] **enable** | **str** | Enable/Disable Event Forwarder [true/false] | [optional] [default to 'true'] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **host** | **str** | Workstation Host | [optional] **items_event_source_locations** | **list[str]** | Items Event sources | [optional] diff --git a/docs/EventForwarderUpdateSlack.md b/docs/EventForwarderUpdateSlack.md index 475f4b31..9d299d9c 100644 --- a/docs/EventForwarderUpdateSlack.md +++ b/docs/EventForwarderUpdateSlack.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes **auth_methods_event_source_locations** | **list[str]** | Auth Method Event sources | [optional] **description** | **str** | Description of the object | [optional] **enable** | **str** | Enable/Disable Event Forwarder [true/false] | [optional] [default to 'true'] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **items_event_source_locations** | **list[str]** | Items Event sources | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] diff --git a/docs/EventForwarderUpdateWebhook.md b/docs/EventForwarderUpdateWebhook.md index 3a339921..7a9283db 100644 --- a/docs/EventForwarderUpdateWebhook.md +++ b/docs/EventForwarderUpdateWebhook.md @@ -6,11 +6,11 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **auth_methods_event_source_locations** | **list[str]** | Auth Method Event sources | [optional] **auth_token** | **str** | Base64 encoded Token string for authentication type Token | [optional] -**auth_type** | **str** | The Webhook authentication type [user-pass, token, certificate] | [optional] [default to 'user-pass'] +**auth_type** | **str** | The Webhook authentication type [user-pass, bearer-token, certificate] | [optional] [default to 'user-pass'] **client_cert_data** | **str** | Base64 encoded PEM certificate, relevant for certificate auth-type | [optional] **description** | **str** | Description of the object | [optional] **enable** | **str** | Enable/Disable Event Forwarder [true/false] | [optional] [default to 'true'] -**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated] | [optional] +**event_types** | **list[str]** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report] | [optional] **gateways_event_source_locations** | **list[str]** | Event sources | **items_event_source_locations** | **list[str]** | Items Event sources | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] diff --git a/docs/ExportClassicKey.md b/docs/ExportClassicKey.md index ae35551b..45a5ce50 100644 --- a/docs/ExportClassicKey.md +++ b/docs/ExportClassicKey.md @@ -4,6 +4,7 @@ ExportClassicKey is a command that returns the classic key material ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**accessibility** | **str** | for personal password manager | [optional] [default to 'regular'] **export_public_key** | **bool** | Use this option to output only public key | [optional] [default to False] **ignore_cache** | **str** | Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI | [optional] [default to 'false'] **json** | **bool** | Set output format to JSON | [optional] [default to False] diff --git a/docs/ImportPasswords.md b/docs/ImportPasswords.md index 38154bf5..2ffa67af 100644 --- a/docs/ImportPasswords.md +++ b/docs/ImportPasswords.md @@ -5,7 +5,7 @@ importPasswords is a command that import passwords Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **accessibility** | **str** | for personal password manager | [optional] [default to 'personal'] -**format** | **str** | Password format type [LastPass/Chrome/Firefox] | [optional] [default to 'LastPass'] +**format** | **str** | Password format type [LastPass/Chrome/Firefox/1password/keeper/bitwarden/dashlane] | [optional] [default to 'LastPass'] **import_path** | **str** | File path | **json** | **bool** | Set output format to JSON | [optional] [default to False] **protection_key** | **str** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] diff --git a/docs/KerberosAccessRules.md b/docs/KerberosAccessRules.md new file mode 100644 index 00000000..1a30a246 --- /dev/null +++ b/docs/KerberosAccessRules.md @@ -0,0 +1,11 @@ +# KerberosAccessRules + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**sign_public_key** | **str** | | [optional] +**unique_identifier** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KerberosAuthMethodInfo.md b/docs/KerberosAuthMethodInfo.md new file mode 100644 index 00000000..481bd131 --- /dev/null +++ b/docs/KerberosAuthMethodInfo.md @@ -0,0 +1,21 @@ +# KerberosAuthMethodInfo + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**kerberos_keytab** | **str** | | [optional] +**kerberos_krb5_conf** | **str** | | [optional] +**ldap_anonymous_search** | **bool** | | [optional] +**ldap_bind_dn** | **str** | | [optional] +**ldap_bind_password** | **str** | | [optional] +**ldap_certificate** | **str** | | [optional] +**ldap_group_attr** | **str** | | [optional] +**ldap_group_dn** | **str** | | [optional] +**ldap_group_filter** | **str** | | [optional] +**ldap_url_address** | **str** | | [optional] +**ldap_user_attr** | **str** | | [optional] +**ldap_user_dn** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KerberosConfigPart.md b/docs/KerberosConfigPart.md new file mode 100644 index 00000000..b40278a4 --- /dev/null +++ b/docs/KerberosConfigPart.md @@ -0,0 +1,23 @@ +# KerberosConfigPart + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**kerberos_access_id** | **str** | | [optional] +**kerberos_keytab** | **str** | | [optional] +**kerberos_krb_5_conf** | **str** | | [optional] +**kerberos_private_key** | **str** | | [optional] +**ldap_anonymous_search** | **bool** | | [optional] +**ldap_bind_dn** | **str** | | [optional] +**ldap_bind_password** | **str** | | [optional] +**ldap_cert** | **str** | | [optional] +**ldap_group_attr** | **str** | | [optional] +**ldap_group_dn** | **str** | | [optional] +**ldap_group_filter** | **str** | | [optional] +**ldap_url** | **str** | | [optional] +**ldap_user_attr** | **str** | | [optional] +**ldap_user_dn** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeConfigValue.md b/docs/KubeConfigValue.md new file mode 100644 index 00000000..9cbfa2d0 --- /dev/null +++ b/docs/KubeConfigValue.md @@ -0,0 +1,15 @@ +# KubeConfigValue + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**api_version** | **str** | | [optional] +**clusters** | [**list[KubeconfigNamedCluster]**](KubeconfigNamedCluster.md) | | [optional] +**contexts** | [**list[KubeconfigNamedContext]**](KubeconfigNamedContext.md) | | [optional] +**current_context** | **str** | | [optional] +**kind** | **str** | | [optional] +**users** | [**list[KubeconfigUser]**](KubeconfigUser.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigCluster.md b/docs/KubeconfigCluster.md new file mode 100644 index 00000000..40f73dd9 --- /dev/null +++ b/docs/KubeconfigCluster.md @@ -0,0 +1,12 @@ +# KubeconfigCluster + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**certificate_authority** | **str** | CertificateAuthority is optional and can be omitted if not used. | [optional] +**certificate_authority_data** | **str** | | [optional] +**server** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigContext.md b/docs/KubeconfigContext.md new file mode 100644 index 00000000..ae2094d5 --- /dev/null +++ b/docs/KubeconfigContext.md @@ -0,0 +1,12 @@ +# KubeconfigContext + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cluster** | **str** | | [optional] +**namespace** | **str** | | [optional] +**user** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigExec.md b/docs/KubeconfigExec.md new file mode 100644 index 00000000..15bfc8af --- /dev/null +++ b/docs/KubeconfigExec.md @@ -0,0 +1,13 @@ +# KubeconfigExec + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**api_version** | **str** | | [optional] +**args** | **list[str]** | | [optional] +**command** | **str** | | [optional] +**interactive_mode** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigGenerateOutput.md b/docs/KubeconfigGenerateOutput.md new file mode 100644 index 00000000..be4922ea --- /dev/null +++ b/docs/KubeconfigGenerateOutput.md @@ -0,0 +1,12 @@ +# KubeconfigGenerateOutput + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**conflicted_clusters_names** | **list[str]** | | [optional] +**data** | [**KubeConfigValue**](KubeConfigValue.md) | | [optional] +**errors** | **list[str]** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigNamedCluster.md b/docs/KubeconfigNamedCluster.md new file mode 100644 index 00000000..848eb8b7 --- /dev/null +++ b/docs/KubeconfigNamedCluster.md @@ -0,0 +1,11 @@ +# KubeconfigNamedCluster + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**cluster** | [**KubeconfigCluster**](KubeconfigCluster.md) | | [optional] +**name** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigNamedContext.md b/docs/KubeconfigNamedContext.md new file mode 100644 index 00000000..0e3bbdef --- /dev/null +++ b/docs/KubeconfigNamedContext.md @@ -0,0 +1,11 @@ +# KubeconfigNamedContext + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**context** | [**KubeconfigContext**](KubeconfigContext.md) | | [optional] +**name** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigUser.md b/docs/KubeconfigUser.md new file mode 100644 index 00000000..2280a7ae --- /dev/null +++ b/docs/KubeconfigUser.md @@ -0,0 +1,11 @@ +# KubeconfigUser + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**name** | **str** | | [optional] +**user** | [**KubeconfigUserExec**](KubeconfigUserExec.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/KubeconfigUserExec.md b/docs/KubeconfigUserExec.md new file mode 100644 index 00000000..e60131c8 --- /dev/null +++ b/docs/KubeconfigUserExec.md @@ -0,0 +1,10 @@ +# KubeconfigUserExec + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**_exec** | [**KubeconfigExec**](KubeconfigExec.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ListSRASessions.md b/docs/ListSRASessions.md new file mode 100644 index 00000000..2b151dfc --- /dev/null +++ b/docs/ListSRASessions.md @@ -0,0 +1,15 @@ +# ListSRASessions + +listSRASessions is a command that returns sra sessions of the given user +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**json** | **bool** | Set output format to JSON | [optional] [default to False] +**resource_type** | **list[str]** | session resource type. In case it is empty, all resources type will be returned. options: [mysql, k8s, ssh, mongodb, mssql, postgres, aws, eks, gke, rdp] | [optional] +**status_type** | **list[str]** | session status type. In case it is empty, only active sessions will be returned. options: [connecting, connected, failed, completed, terminated] | [optional] +**token** | **str** | Authentication token (see `/auth` and `/configure`) | [optional] +**uid_token** | **str** | The universal identity token, Required only for universal_identity authentication | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/ListSraSessionsOutput.md b/docs/ListSraSessionsOutput.md new file mode 100644 index 00000000..a7b58f1c --- /dev/null +++ b/docs/ListSraSessionsOutput.md @@ -0,0 +1,12 @@ +# ListSraSessionsOutput + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**allowed_gateways** | **list[str]** | | [optional] +**next_page** | **str** | | [optional] +**sessions** | [**list[SraSessionEntryOut]**](SraSessionEntryOut.md) | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/PKICertificateIssueDetails.md b/docs/PKICertificateIssueDetails.md index 59bc4df6..0f9d5cd4 100644 --- a/docs/PKICertificateIssueDetails.md +++ b/docs/PKICertificateIssueDetails.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **allowed_domains_list** | **list[str]** | | [optional] **allowed_extra_extensions** | **dict(str, list[str])** | | [optional] **allowed_uri_sans** | **list[str]** | | [optional] +**auto_renew_certificate** | **bool** | | [optional] **basic_constraints_valid_for_non_ca** | **bool** | | [optional] **certificate_authority_mode** | **str** | | [optional] **client_flag** | **bool** | | [optional] @@ -34,6 +35,7 @@ Name | Type | Description | Notes **postal_code** | **list[str]** | | [optional] **protect_generated_certificates** | **bool** | ProtectGeneratedCertificates dictates whether the created certificates should be protected from deletion | [optional] **province** | **list[str]** | | [optional] +**renew_before_expiration_in_days** | **int** | | [optional] **require_cn** | **bool** | | [optional] **server_flag** | **bool** | | [optional] **street_address** | **list[str]** | | [optional] diff --git a/docs/SignEcDsa.md b/docs/SignEcDsa.md index fd5904f9..3431e0ef 100644 --- a/docs/SignEcDsa.md +++ b/docs/SignEcDsa.md @@ -4,6 +4,7 @@ signEcDsa Calculates the signature of a given message using ECDSA and a sha hash ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- +**accessibility** | **str** | for personal password manager | [optional] [default to 'regular'] **display_id** | **str** | The display id of the EC key to use for the signing process | [optional] **item_id** | **int** | The item id of the EC key to use for the signing process | [optional] **json** | **bool** | Set output format to JSON | [optional] [default to False] diff --git a/docs/SraSessionEntryOut.md b/docs/SraSessionEntryOut.md new file mode 100644 index 00000000..c1a7b267 --- /dev/null +++ b/docs/SraSessionEntryOut.md @@ -0,0 +1,24 @@ +# SraSessionEntryOut + +## Properties +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**access_id** | **str** | | [optional] +**client_type** | **str** | | [optional] +**cluster_unique_id** | **int** | | [optional] +**connection_type** | **str** | | [optional] +**end_time** | **datetime** | | [optional] +**error_msg** | **str** | | [optional] +**gateway_name** | **str** | | [optional] +**instance_id** | **str** | | [optional] +**secret_name** | **str** | | [optional] +**session_id** | **str** | | [optional] +**start_time** | **datetime** | | [optional] +**status** | **str** | | [optional] +**target_host** | **str** | | [optional] +**ttl** | **str** | | [optional] +**user_identifier** | **str** | | [optional] + +[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) + + diff --git a/docs/UpdatePKICertIssuer.md b/docs/UpdatePKICertIssuer.md index ee06aa75..2bf4f342 100644 --- a/docs/UpdatePKICertIssuer.md +++ b/docs/UpdatePKICertIssuer.md @@ -10,6 +10,7 @@ Name | Type | Description | Notes **allowed_domains** | **str** | A list of the allowed domains that clients can request to be included in the certificate (in a comma-delimited list) | [optional] **allowed_extra_extensions** | **str** | A json string containing the allowed extra extensions for the pki cert issuer | [optional] **allowed_uri_sans** | **str** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] +**auto_renew** | **bool** | Automatically renew certificates before expiration | [optional] **client_flag** | **bool** | If set, certificates will be flagged for client auth use | [optional] **code_signing_flag** | **bool** | If set, certificates will be flagged for code signing use | [optional] **country** | **str** | A comma-separated list of countries that will be set in the issued certificate | [optional] @@ -37,6 +38,7 @@ Name | Type | Description | Notes **protect_certificates** | **bool** | Whether to protect generated certificates from deletion | [optional] **province** | **str** | A comma-separated list of provinces that will be set in the issued certificate | [optional] **rm_tag** | **list[str]** | List of the existent tags that will be removed from this item | [optional] +**scheduled_renew** | **int** | Number of days before expiration to renew certificates | [optional] **server_flag** | **bool** | If set, certificates will be flagged for server auth use | [optional] **signer_key_name** | **str** | A key to sign the certificate with, required in Private CA mode | [default to 'dummy_signer_key'] **street_address** | **str** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] diff --git a/docs/V2Api.md b/docs/V2Api.md index cbf2b59a..d4ada932 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -15,6 +15,7 @@ Method | HTTP request | Description [**auth_method_create_email**](V2Api.md#auth_method_create_email) | **POST** /auth-method-create-email | [**auth_method_create_gcp**](V2Api.md#auth_method_create_gcp) | **POST** /auth-method-create-gcp | [**auth_method_create_k8s**](V2Api.md#auth_method_create_k8s) | **POST** /auth-method-create-k8s | +[**auth_method_create_kerberos**](V2Api.md#auth_method_create_kerberos) | **POST** /auth-method-create-kerberos | [**auth_method_create_ldap**](V2Api.md#auth_method_create_ldap) | **POST** /auth-method-create-ldap | [**auth_method_create_oauth2**](V2Api.md#auth_method_create_oauth2) | **POST** /auth-method-create-oauth2 | [**auth_method_create_oci**](V2Api.md#auth_method_create_oci) | **POST** /auth-method-create-oci | @@ -31,6 +32,7 @@ Method | HTTP request | Description [**auth_method_update_email**](V2Api.md#auth_method_update_email) | **POST** /auth-method-update-email | [**auth_method_update_gcp**](V2Api.md#auth_method_update_gcp) | **POST** /auth-method-update-gcp | [**auth_method_update_k8s**](V2Api.md#auth_method_update_k8s) | **POST** /auth-method-update-k8s | +[**auth_method_update_kerberos**](V2Api.md#auth_method_update_kerberos) | **POST** /auth-method-update-kerberos | [**auth_method_update_ldap**](V2Api.md#auth_method_update_ldap) | **POST** /auth-method-update-ldap | [**auth_method_update_oauth2**](V2Api.md#auth_method_update_oauth2) | **POST** /auth-method-update-oauth2 | [**auth_method_update_oci**](V2Api.md#auth_method_update_oci) | **POST** /auth-method-update-oci | @@ -79,6 +81,7 @@ Method | HTTP request | Description [**create_linked_target**](V2Api.md#create_linked_target) | **POST** /create-linked-target | [**create_native_k8_s_target**](V2Api.md#create_native_k8_s_target) | **POST** /create-k8s-target | [**create_oidc_app**](V2Api.md#create_oidc_app) | **POST** /create-oidc-app | +[**create_passkey**](V2Api.md#create_passkey) | **POST** /create-passkey | [**create_ping_target**](V2Api.md#create_ping_target) | **POST** /create-ping-target | [**create_pki_cert_issuer**](V2Api.md#create_pki_cert_issuer) | **POST** /create-pki-cert-issuer | [**create_rabbit_mq_target**](V2Api.md#create_rabbit_mq_target) | **POST** /create-rabbitmq-target | @@ -355,6 +358,7 @@ Method | HTTP request | Description [**kmip_renew_server_certificate**](V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment | [**kmip_server_setup**](V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment | [**kmip_set_server_state**](V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state | +[**kubeconfig_generate**](V2Api.md#kubeconfig_generate) | **POST** /kubeconfig-generate | [**list_acme_accounts**](V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts | [**list_auth_methods**](V2Api.md#list_auth_methods) | **POST** /list-auth-methods | [**list_gateways**](V2Api.md#list_gateways) | **POST** /list-gateways | @@ -363,6 +367,7 @@ Method | HTTP request | Description [**list_roles**](V2Api.md#list_roles) | **POST** /list-roles | [**list_shared_items**](V2Api.md#list_shared_items) | **POST** /list-shared-items | [**list_sra_bastions**](V2Api.md#list_sra_bastions) | **POST** /list-sra-bastions | +[**list_sra_sessions**](V2Api.md#list_sra_sessions) | **POST** /list-sra-sessions | [**list_targets**](V2Api.md#list_targets) | **POST** /list-targets | [**move_objects**](V2Api.md#move_objects) | **POST** /move-objects | [**provision_certificate**](V2Api.md#provision_certificate) | **POST** /provision-certificate | @@ -370,6 +375,7 @@ Method | HTTP request | Description [**refresh_key**](V2Api.md#refresh_key) | **POST** /refresh-key | [**renew_certificate**](V2Api.md#renew_certificate) | **POST** /renew-certificate | [**request_access**](V2Api.md#request_access) | **POST** /request-access | +[**reset_access_key**](V2Api.md#reset_access_key) | **POST** /reset-access-key | [**reverse_rbac**](V2Api.md#reverse_rbac) | **POST** /reverse-rbac | [**revoke_certificate**](V2Api.md#revoke_certificate) | **POST** /revoke-certificate | [**revoke_creds**](V2Api.md#revoke_creds) | **POST** /revoke-creds | @@ -1223,6 +1229,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **auth_method_create_kerberos** +> AuthMethodCreateOutput auth_method_create_kerberos(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.AuthMethodCreateKerberos() # AuthMethodCreateKerberos | + + try: + api_response = api_instance.auth_method_create_kerberos(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->auth_method_create_kerberos: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**AuthMethodCreateKerberos**](AuthMethodCreateKerberos.md)| | + +### Return type + +[**AuthMethodCreateOutput**](AuthMethodCreateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**201** | | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **auth_method_create_ldap** > AuthMethodCreateOutput auth_method_create_ldap(body) @@ -1578,7 +1644,7 @@ No authorization required ### HTTP response details | Status code | Description | Response headers | |-------------|-------------|------------------| -**201** | authMethodCreateUniversalIdentityResponse wraps response body. | - | +**201** | | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) @@ -2183,6 +2249,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **auth_method_update_kerberos** +> AuthMethodCreateOutput auth_method_update_kerberos(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.AuthMethodUpdateKerberos() # AuthMethodUpdateKerberos | + + try: + api_response = api_instance.auth_method_update_kerberos(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->auth_method_update_kerberos: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**AuthMethodUpdateKerberos**](AuthMethodUpdateKerberos.md)| | + +### Return type + +[**AuthMethodCreateOutput**](AuthMethodCreateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**201** | | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **auth_method_update_ldap** > AuthMethodUpdateOutput auth_method_update_ldap(body) @@ -5063,6 +5189,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **create_passkey** +> CreatePasskeyOutput create_passkey(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.CreatePasskey() # CreatePasskey | + + try: + api_response = api_instance.create_passkey(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->create_passkey: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**CreatePasskey**](CreatePasskey.md)| | + +### Return type + +[**CreatePasskeyOutput**](CreatePasskeyOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**201** | CreatePasskeyResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **create_ping_target** > CreatePingTargetOutput create_ping_target(body) @@ -18562,7 +18748,7 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **gateway_update_remote_access** -> object gateway_update_remote_access() +> object gateway_update_remote_access(body) @@ -18585,16 +18771,20 @@ configuration = akeyless.Configuration( with akeyless.ApiClient() as api_client: # Create an instance of the API class api_instance = akeyless.V2Api(api_client) - + body = akeyless.GatewayUpdateRemoteAccess() # GatewayUpdateRemoteAccess | + try: - api_response = api_instance.gateway_update_remote_access() + api_response = api_instance.gateway_update_remote_access(body) pprint(api_response) except ApiException as e: print("Exception when calling V2Api->gateway_update_remote_access: %s\n" % e) ``` ### Parameters -This endpoint does not need any parameter. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**GatewayUpdateRemoteAccess**](GatewayUpdateRemoteAccess.md)| | ### Return type @@ -18606,7 +18796,7 @@ No authorization required ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json ### HTTP response details @@ -21612,6 +21802,62 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **kubeconfig_generate** +> KubeconfigGenerateOutput kubeconfig_generate() + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + + try: + api_response = api_instance.kubeconfig_generate() + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->kubeconfig_generate: %s\n" % e) +``` + +### Parameters +This endpoint does not need any parameter. + +### Return type + +[**KubeconfigGenerateOutput**](KubeconfigGenerateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: Not defined + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | kubeconfigGenerateResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **list_acme_accounts** > ListAcmeAccountsOutput list_acme_accounts(body) @@ -22091,6 +22337,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **list_sra_sessions** +> ListSraSessionsOutput list_sra_sessions(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.ListSRASessions() # ListSRASessions | + + try: + api_response = api_instance.list_sra_sessions(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->list_sra_sessions: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ListSRASessions**](ListSRASessions.md)| | + +### Return type + +[**ListSraSessionsOutput**](ListSraSessionsOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | listSRASessionsResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **list_targets** > ListTargetsOutput list_targets(body) @@ -22511,6 +22817,66 @@ No authorization required [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) +# **reset_access_key** +> ResetAuthMethodAccessKeyOutput reset_access_key(body) + + + +### Example + +```python +from __future__ import print_function +import time +import akeyless +from akeyless.rest import ApiException +from pprint import pprint +# Defining the host is optional and defaults to https://api.akeyless.io +# See configuration.py for a list of all supported configuration parameters. +configuration = akeyless.Configuration( + host = "https://api.akeyless.io" +) + + +# Enter a context with an instance of the API client +with akeyless.ApiClient() as api_client: + # Create an instance of the API class + api_instance = akeyless.V2Api(api_client) + body = akeyless.ResetAccessKey() # ResetAccessKey | + + try: + api_response = api_instance.reset_access_key(body) + pprint(api_response) + except ApiException as e: + print("Exception when calling V2Api->reset_access_key: %s\n" % e) +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**ResetAccessKey**](ResetAccessKey.md)| | + +### Return type + +[**ResetAuthMethodAccessKeyOutput**](ResetAuthMethodAccessKeyOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**200** | resetAccessKeyResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +[[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) + # **reverse_rbac** > ReverseRBACOutput reverse_rbac(body) diff --git a/setup.py b/setup.py index a103c9af..6c205be2 100644 --- a/setup.py +++ b/setup.py @@ -14,7 +14,7 @@ from setuptools import setup, find_packages # noqa: H301 NAME = "akeyless" -VERSION = "4.2.5" +VERSION = "4.3.0" # To install the library, run the following # # python setup.py install diff --git a/test/test_auth_method_additional_data.py b/test/test_auth_method_additional_data.py new file mode 100644 index 00000000..1f53fd60 --- /dev/null +++ b/test/test_auth_method_additional_data.py @@ -0,0 +1,65 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.auth_method_additional_data import AuthMethodAdditionalData # noqa: E501 +from akeyless.rest import ApiException + +class TestAuthMethodAdditionalData(unittest.TestCase): + """AuthMethodAdditionalData unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test AuthMethodAdditionalData + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.auth_method_additional_data.AuthMethodAdditionalData() # noqa: E501 + if include_optional : + return AuthMethodAdditionalData( + kerberos_data = akeyless.models.kerberos_auth_method_info.KerberosAuthMethodInfo( + kerberos_keytab = '0', + kerberos_krb5_conf = '0', + ldap_anonymous_search = True, + ldap_bind_dn = '0', + ldap_bind_password = '0', + ldap_certificate = '0', + ldap_group_attr = '0', + ldap_group_dn = '0', + ldap_group_filter = '0', + ldap_url_address = '0', + ldap_user_attr = '0', + ldap_user_dn = '0', ) + ) + else : + return AuthMethodAdditionalData( + ) + + def testAuthMethodAdditionalData(self): + """Test AuthMethodAdditionalData""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_auth_method_create_kerberos.py b/test/test_auth_method_create_kerberos.py new file mode 100644 index 00000000..93e62346 --- /dev/null +++ b/test/test_auth_method_create_kerberos.py @@ -0,0 +1,92 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.auth_method_create_kerberos import AuthMethodCreateKerberos # noqa: E501 +from akeyless.rest import ApiException + +class TestAuthMethodCreateKerberos(unittest.TestCase): + """AuthMethodCreateKerberos unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test AuthMethodCreateKerberos + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.auth_method_create_kerberos.AuthMethodCreateKerberos() # noqa: E501 + if include_optional : + return AuthMethodCreateKerberos( + access_expires = 56, + audit_logs_claims = [ + '0' + ], + bind_dn = '0', + bind_dn_password = '0', + bound_ips = [ + '0' + ], + delete_protection = '0', + description = '0', + force_sub_claims = True, + group_attr = '0', + group_dn = '0', + group_filter = '0', + gw_bound_ips = [ + '0' + ], + json = True, + jwt_ttl = 56, + keytab_file_data = '0', + keytab_file_path = '0', + krb5_conf_data = '0', + krb5_conf_path = '0', + ldap_anonymous_search = True, + ldap_ca_cert = '0', + ldap_url = '0', + name = '0', + product_type = [ + '0' + ], + subclaims_delimiters = [ + '0' + ], + token = '0', + uid_token = '0', + unique_identifier = '0', + user_attribute = '0', + user_dn = '0' + ) + else : + return AuthMethodCreateKerberos( + name = '0', + ) + + def testAuthMethodCreateKerberos(self): + """Test AuthMethodCreateKerberos""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_auth_method_update_kerberos.py b/test/test_auth_method_update_kerberos.py new file mode 100644 index 00000000..8b85951e --- /dev/null +++ b/test/test_auth_method_update_kerberos.py @@ -0,0 +1,93 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.auth_method_update_kerberos import AuthMethodUpdateKerberos # noqa: E501 +from akeyless.rest import ApiException + +class TestAuthMethodUpdateKerberos(unittest.TestCase): + """AuthMethodUpdateKerberos unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test AuthMethodUpdateKerberos + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.auth_method_update_kerberos.AuthMethodUpdateKerberos() # noqa: E501 + if include_optional : + return AuthMethodUpdateKerberos( + access_expires = 56, + audit_logs_claims = [ + '0' + ], + bind_dn = '0', + bind_dn_password = '0', + bound_ips = [ + '0' + ], + delete_protection = '0', + description = '0', + force_sub_claims = True, + group_attr = '0', + group_dn = '0', + group_filter = '0', + gw_bound_ips = [ + '0' + ], + json = True, + jwt_ttl = 56, + keytab_file_data = '0', + keytab_file_path = '0', + krb5_conf_data = '0', + krb5_conf_path = '0', + ldap_anonymous_search = True, + ldap_ca_cert = '0', + ldap_url = '0', + name = '0', + new_name = '0', + product_type = [ + '0' + ], + subclaims_delimiters = [ + '0' + ], + token = '0', + uid_token = '0', + unique_identifier = '0', + user_attribute = '0', + user_dn = '0' + ) + else : + return AuthMethodUpdateKerberos( + name = '0', + ) + + def testAuthMethodUpdateKerberos(self): + """Test AuthMethodUpdateKerberos""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_create_passkey.py b/test/test_create_passkey.py new file mode 100644 index 00000000..5556e5e2 --- /dev/null +++ b/test/test_create_passkey.py @@ -0,0 +1,70 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.create_passkey import CreatePasskey # noqa: E501 +from akeyless.rest import ApiException + +class TestCreatePasskey(unittest.TestCase): + """CreatePasskey unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test CreatePasskey + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.create_passkey.CreatePasskey() # noqa: E501 + if include_optional : + return CreatePasskey( + accessibility = 'regular', + alg = 'EC256', + delete_protection = '0', + description = '0', + json = True, + name = '0', + origin_url = [ + '0' + ], + protection_key_name = '0', + tags = [ + '0' + ], + token = '0', + uid_token = '0', + username = '0' + ) + else : + return CreatePasskey( + alg = 'EC256', + name = '0', + ) + + def testCreatePasskey(self): + """Test CreatePasskey""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_create_passkey_output.py b/test/test_create_passkey_output.py new file mode 100644 index 00000000..9150e06a --- /dev/null +++ b/test/test_create_passkey_output.py @@ -0,0 +1,56 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.create_passkey_output import CreatePasskeyOutput # noqa: E501 +from akeyless.rest import ApiException + +class TestCreatePasskeyOutput(unittest.TestCase): + """CreatePasskeyOutput unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test CreatePasskeyOutput + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.create_passkey_output.CreatePasskeyOutput() # noqa: E501 + if include_optional : + return CreatePasskeyOutput( + classic_key_id = '0', + classic_key_name = '0', + classic_key_type = '0', + public_key = '0' + ) + else : + return CreatePasskeyOutput( + ) + + def testCreatePasskeyOutput(self): + """Test CreatePasskeyOutput""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kerberos_access_rules.py b/test/test_kerberos_access_rules.py new file mode 100644 index 00000000..cfb08850 --- /dev/null +++ b/test/test_kerberos_access_rules.py @@ -0,0 +1,54 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kerberos_access_rules import KerberosAccessRules # noqa: E501 +from akeyless.rest import ApiException + +class TestKerberosAccessRules(unittest.TestCase): + """KerberosAccessRules unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KerberosAccessRules + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kerberos_access_rules.KerberosAccessRules() # noqa: E501 + if include_optional : + return KerberosAccessRules( + sign_public_key = '0', + unique_identifier = '0' + ) + else : + return KerberosAccessRules( + ) + + def testKerberosAccessRules(self): + """Test KerberosAccessRules""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kerberos_auth_method_info.py b/test/test_kerberos_auth_method_info.py new file mode 100644 index 00000000..8786b62d --- /dev/null +++ b/test/test_kerberos_auth_method_info.py @@ -0,0 +1,64 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kerberos_auth_method_info import KerberosAuthMethodInfo # noqa: E501 +from akeyless.rest import ApiException + +class TestKerberosAuthMethodInfo(unittest.TestCase): + """KerberosAuthMethodInfo unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KerberosAuthMethodInfo + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kerberos_auth_method_info.KerberosAuthMethodInfo() # noqa: E501 + if include_optional : + return KerberosAuthMethodInfo( + kerberos_keytab = '0', + kerberos_krb5_conf = '0', + ldap_anonymous_search = True, + ldap_bind_dn = '0', + ldap_bind_password = '0', + ldap_certificate = '0', + ldap_group_attr = '0', + ldap_group_dn = '0', + ldap_group_filter = '0', + ldap_url_address = '0', + ldap_user_attr = '0', + ldap_user_dn = '0' + ) + else : + return KerberosAuthMethodInfo( + ) + + def testKerberosAuthMethodInfo(self): + """Test KerberosAuthMethodInfo""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kerberos_config_part.py b/test/test_kerberos_config_part.py new file mode 100644 index 00000000..fc471acf --- /dev/null +++ b/test/test_kerberos_config_part.py @@ -0,0 +1,66 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kerberos_config_part import KerberosConfigPart # noqa: E501 +from akeyless.rest import ApiException + +class TestKerberosConfigPart(unittest.TestCase): + """KerberosConfigPart unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KerberosConfigPart + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kerberos_config_part.KerberosConfigPart() # noqa: E501 + if include_optional : + return KerberosConfigPart( + kerberos_access_id = '0', + kerberos_keytab = '0', + kerberos_krb_5_conf = '0', + kerberos_private_key = '0', + ldap_anonymous_search = True, + ldap_bind_dn = '0', + ldap_bind_password = '0', + ldap_cert = '0', + ldap_group_attr = '0', + ldap_group_dn = '0', + ldap_group_filter = '0', + ldap_url = '0', + ldap_user_attr = '0', + ldap_user_dn = '0' + ) + else : + return KerberosConfigPart( + ) + + def testKerberosConfigPart(self): + """Test KerberosConfigPart""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kube_config_value.py b/test/test_kube_config_value.py new file mode 100644 index 00000000..2a66280d --- /dev/null +++ b/test/test_kube_config_value.py @@ -0,0 +1,83 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kube_config_value import KubeConfigValue # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeConfigValue(unittest.TestCase): + """KubeConfigValue unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeConfigValue + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kube_config_value.KubeConfigValue() # noqa: E501 + if include_optional : + return KubeConfigValue( + api_version = '0', + clusters = [ + akeyless.models.kubeconfig_named_cluster_represents_a_named_cluster_in_the_kubeconfig/.KubeconfigNamedCluster represents a named cluster in the Kubeconfig.( + cluster = akeyless.models.kubeconfig_cluster_represents_the_cluster_details/.KubeconfigCluster represents the cluster details.( + certificate_authority = '0', + certificate_authority_data = '0', + server = '0', ), + name = '0', ) + ], + contexts = [ + akeyless.models.kubeconfig_named_context_represents_a_named_context_in_the_kubeconfig/.KubeconfigNamedContext represents a named context in the Kubeconfig.( + context = akeyless.models.kubeconfig_context_represents_the_context_details/.KubeconfigContext represents the context details.( + cluster = '0', + namespace = '0', + user = '0', ), + name = '0', ) + ], + current_context = '0', + kind = '0', + users = [ + akeyless.models.kubeconfig_user_represents_a_user_entry_in_the_kubeconfig/.KubeconfigUser represents a user entry in the Kubeconfig.( + name = '0', + user = akeyless.models.kubeconfig_user_exec_represents_the_exec_configuration_for_a_user/.KubeconfigUserExec represents the exec configuration for a user.( + exec = akeyless.models.kubeconfig_exec_represents_the_exec_command_configuration/.KubeconfigExec represents the exec command configuration.( + api_version = '0', + args = [ + '0' + ], + command = '0', + interactive_mode = '0', ), ), ) + ] + ) + else : + return KubeConfigValue( + ) + + def testKubeConfigValue(self): + """Test KubeConfigValue""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_cluster.py b/test/test_kubeconfig_cluster.py new file mode 100644 index 00000000..670acb97 --- /dev/null +++ b/test/test_kubeconfig_cluster.py @@ -0,0 +1,55 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_cluster import KubeconfigCluster # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigCluster(unittest.TestCase): + """KubeconfigCluster unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigCluster + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_cluster.KubeconfigCluster() # noqa: E501 + if include_optional : + return KubeconfigCluster( + certificate_authority = '0', + certificate_authority_data = '0', + server = '0' + ) + else : + return KubeconfigCluster( + ) + + def testKubeconfigCluster(self): + """Test KubeconfigCluster""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_context.py b/test/test_kubeconfig_context.py new file mode 100644 index 00000000..06f0f2fd --- /dev/null +++ b/test/test_kubeconfig_context.py @@ -0,0 +1,55 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_context import KubeconfigContext # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigContext(unittest.TestCase): + """KubeconfigContext unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigContext + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_context.KubeconfigContext() # noqa: E501 + if include_optional : + return KubeconfigContext( + cluster = '0', + namespace = '0', + user = '0' + ) + else : + return KubeconfigContext( + ) + + def testKubeconfigContext(self): + """Test KubeconfigContext""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_exec.py b/test/test_kubeconfig_exec.py new file mode 100644 index 00000000..755c44b3 --- /dev/null +++ b/test/test_kubeconfig_exec.py @@ -0,0 +1,58 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_exec import KubeconfigExec # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigExec(unittest.TestCase): + """KubeconfigExec unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigExec + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_exec.KubeconfigExec() # noqa: E501 + if include_optional : + return KubeconfigExec( + api_version = '0', + args = [ + '0' + ], + command = '0', + interactive_mode = '0' + ) + else : + return KubeconfigExec( + ) + + def testKubeconfigExec(self): + """Test KubeconfigExec""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_generate_output.py b/test/test_kubeconfig_generate_output.py new file mode 100644 index 00000000..56f959d9 --- /dev/null +++ b/test/test_kubeconfig_generate_output.py @@ -0,0 +1,89 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_generate_output import KubeconfigGenerateOutput # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigGenerateOutput(unittest.TestCase): + """KubeconfigGenerateOutput unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigGenerateOutput + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_generate_output.KubeconfigGenerateOutput() # noqa: E501 + if include_optional : + return KubeconfigGenerateOutput( + conflicted_clusters_names = [ + '0' + ], + data = akeyless.models.kube_config_value_represents_the_entire_kubeconfig_structure/.KubeConfigValue represents the entire Kubeconfig structure.( + api_version = '0', + clusters = [ + akeyless.models.kubeconfig_named_cluster_represents_a_named_cluster_in_the_kubeconfig/.KubeconfigNamedCluster represents a named cluster in the Kubeconfig.( + cluster = akeyless.models.kubeconfig_cluster_represents_the_cluster_details/.KubeconfigCluster represents the cluster details.( + certificate_authority = '0', + certificate_authority_data = '0', + server = '0', ), + name = '0', ) + ], + contexts = [ + akeyless.models.kubeconfig_named_context_represents_a_named_context_in_the_kubeconfig/.KubeconfigNamedContext represents a named context in the Kubeconfig.( + context = akeyless.models.kubeconfig_context_represents_the_context_details/.KubeconfigContext represents the context details.( + namespace = '0', + user = '0', ), + name = '0', ) + ], + current_context = '0', + kind = '0', + users = [ + akeyless.models.kubeconfig_user_represents_a_user_entry_in_the_kubeconfig/.KubeconfigUser represents a user entry in the Kubeconfig.( + name = '0', + user = akeyless.models.kubeconfig_user_exec_represents_the_exec_configuration_for_a_user/.KubeconfigUserExec represents the exec configuration for a user.( + exec = akeyless.models.kubeconfig_exec_represents_the_exec_command_configuration/.KubeconfigExec represents the exec command configuration.( + api_version = '0', + args = [ + '0' + ], + command = '0', + interactive_mode = '0', ), ), ) + ], ), + errors = [ + '0' + ] + ) + else : + return KubeconfigGenerateOutput( + ) + + def testKubeconfigGenerateOutput(self): + """Test KubeconfigGenerateOutput""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_named_cluster.py b/test/test_kubeconfig_named_cluster.py new file mode 100644 index 00000000..a75db5bf --- /dev/null +++ b/test/test_kubeconfig_named_cluster.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_named_cluster import KubeconfigNamedCluster # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigNamedCluster(unittest.TestCase): + """KubeconfigNamedCluster unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigNamedCluster + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_named_cluster.KubeconfigNamedCluster() # noqa: E501 + if include_optional : + return KubeconfigNamedCluster( + cluster = akeyless.models.kubeconfig_cluster_represents_the_cluster_details/.KubeconfigCluster represents the cluster details.( + certificate_authority = '0', + certificate_authority_data = '0', + server = '0', ), + name = '0' + ) + else : + return KubeconfigNamedCluster( + ) + + def testKubeconfigNamedCluster(self): + """Test KubeconfigNamedCluster""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_named_context.py b/test/test_kubeconfig_named_context.py new file mode 100644 index 00000000..01627eea --- /dev/null +++ b/test/test_kubeconfig_named_context.py @@ -0,0 +1,57 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_named_context import KubeconfigNamedContext # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigNamedContext(unittest.TestCase): + """KubeconfigNamedContext unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigNamedContext + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_named_context.KubeconfigNamedContext() # noqa: E501 + if include_optional : + return KubeconfigNamedContext( + context = akeyless.models.kubeconfig_context_represents_the_context_details/.KubeconfigContext represents the context details.( + cluster = '0', + namespace = '0', + user = '0', ), + name = '0' + ) + else : + return KubeconfigNamedContext( + ) + + def testKubeconfigNamedContext(self): + """Test KubeconfigNamedContext""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_user.py b/test/test_kubeconfig_user.py new file mode 100644 index 00000000..00484af6 --- /dev/null +++ b/test/test_kubeconfig_user.py @@ -0,0 +1,61 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_user import KubeconfigUser # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigUser(unittest.TestCase): + """KubeconfigUser unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigUser + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_user.KubeconfigUser() # noqa: E501 + if include_optional : + return KubeconfigUser( + name = '0', + user = akeyless.models.kubeconfig_user_exec_represents_the_exec_configuration_for_a_user/.KubeconfigUserExec represents the exec configuration for a user.( + exec = akeyless.models.kubeconfig_exec_represents_the_exec_command_configuration/.KubeconfigExec represents the exec command configuration.( + api_version = '0', + args = [ + '0' + ], + command = '0', + interactive_mode = '0', ), ) + ) + else : + return KubeconfigUser( + ) + + def testKubeconfigUser(self): + """Test KubeconfigUser""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_kubeconfig_user_exec.py b/test/test_kubeconfig_user_exec.py new file mode 100644 index 00000000..95e948fd --- /dev/null +++ b/test/test_kubeconfig_user_exec.py @@ -0,0 +1,59 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.kubeconfig_user_exec import KubeconfigUserExec # noqa: E501 +from akeyless.rest import ApiException + +class TestKubeconfigUserExec(unittest.TestCase): + """KubeconfigUserExec unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test KubeconfigUserExec + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.kubeconfig_user_exec.KubeconfigUserExec() # noqa: E501 + if include_optional : + return KubeconfigUserExec( + _exec = akeyless.models.kubeconfig_exec_represents_the_exec_command_configuration/.KubeconfigExec represents the exec command configuration.( + api_version = '0', + args = [ + '0' + ], + command = '0', + interactive_mode = '0', ) + ) + else : + return KubeconfigUserExec( + ) + + def testKubeconfigUserExec(self): + """Test KubeconfigUserExec""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_list_sra_sessions.py b/test/test_list_sra_sessions.py new file mode 100644 index 00000000..f0b65ccf --- /dev/null +++ b/test/test_list_sra_sessions.py @@ -0,0 +1,61 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.list_sra_sessions import ListSRASessions # noqa: E501 +from akeyless.rest import ApiException + +class TestListSRASessions(unittest.TestCase): + """ListSRASessions unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ListSRASessions + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.list_sra_sessions.ListSRASessions() # noqa: E501 + if include_optional : + return ListSRASessions( + json = True, + resource_type = [ + '0' + ], + status_type = [ + '0' + ], + token = '0', + uid_token = '0' + ) + else : + return ListSRASessions( + ) + + def testListSRASessions(self): + """Test ListSRASessions""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_list_sra_sessions_output.py b/test/test_list_sra_sessions_output.py new file mode 100644 index 00000000..705b6a52 --- /dev/null +++ b/test/test_list_sra_sessions_output.py @@ -0,0 +1,74 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.list_sra_sessions_output import ListSraSessionsOutput # noqa: E501 +from akeyless.rest import ApiException + +class TestListSraSessionsOutput(unittest.TestCase): + """ListSraSessionsOutput unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test ListSraSessionsOutput + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.list_sra_sessions_output.ListSraSessionsOutput() # noqa: E501 + if include_optional : + return ListSraSessionsOutput( + allowed_gateways = [ + '0' + ], + next_page = '0', + sessions = [ + akeyless.models.sra_session_entry_out.SraSessionEntryOut( + access_id = '0', + client_type = '0', + cluster_unique_id = 56, + connection_type = '0', + end_time = datetime.datetime.strptime('2013-10-20 19:20:30.00', '%Y-%m-%d %H:%M:%S.%f'), + error_msg = '0', + gateway_name = '0', + instance_id = '0', + secret_name = '0', + session_id = '0', + start_time = datetime.datetime.strptime('2013-10-20 19:20:30.00', '%Y-%m-%d %H:%M:%S.%f'), + status = '0', + target_host = '0', + ttl = '0', + user_identifier = '0', ) + ] + ) + else : + return ListSraSessionsOutput( + ) + + def testListSraSessionsOutput(self): + """Test ListSraSessionsOutput""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main() diff --git a/test/test_sra_session_entry_out.py b/test/test_sra_session_entry_out.py new file mode 100644 index 00000000..ddfb3d96 --- /dev/null +++ b/test/test_sra_session_entry_out.py @@ -0,0 +1,67 @@ +# coding: utf-8 + +""" + Akeyless API + + The purpose of this application is to provide access to Akeyless API. # noqa: E501 + + The version of the OpenAPI document: 2.0 + Contact: support@akeyless.io + Generated by: https://openapi-generator.tech +""" + + +from __future__ import absolute_import + +import unittest +import datetime + +import akeyless +from akeyless.models.sra_session_entry_out import SraSessionEntryOut # noqa: E501 +from akeyless.rest import ApiException + +class TestSraSessionEntryOut(unittest.TestCase): + """SraSessionEntryOut unit test stubs""" + + def setUp(self): + pass + + def tearDown(self): + pass + + def make_instance(self, include_optional): + """Test SraSessionEntryOut + include_option is a boolean, when False only required + params are included, when True both required and + optional params are included """ + # model = akeyless.models.sra_session_entry_out.SraSessionEntryOut() # noqa: E501 + if include_optional : + return SraSessionEntryOut( + access_id = '0', + client_type = '0', + cluster_unique_id = 56, + connection_type = '0', + end_time = datetime.datetime.strptime('2013-10-20 19:20:30.00', '%Y-%m-%d %H:%M:%S.%f'), + error_msg = '0', + gateway_name = '0', + instance_id = '0', + secret_name = '0', + session_id = '0', + start_time = datetime.datetime.strptime('2013-10-20 19:20:30.00', '%Y-%m-%d %H:%M:%S.%f'), + status = '0', + target_host = '0', + ttl = '0', + user_identifier = '0' + ) + else : + return SraSessionEntryOut( + ) + + def testSraSessionEntryOut(self): + """Test SraSessionEntryOut""" + inst_req_only = self.make_instance(include_optional=False) + inst_req_and_optional = self.make_instance(include_optional=True) + + +if __name__ == '__main__': + unittest.main()