diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES index c9058d82..31c041da 100644 --- a/.openapi-generator/FILES +++ b/.openapi-generator/FILES @@ -229,6 +229,7 @@ docs/DynamicSecretCreateEks.md docs/DynamicSecretCreateGcp.md docs/DynamicSecretCreateGithub.md docs/DynamicSecretCreateGke.md +docs/DynamicSecretCreateGoogleWorkspace.md docs/DynamicSecretCreateHanaDb.md docs/DynamicSecretCreateK8s.md docs/DynamicSecretCreateLdap.md @@ -266,6 +267,7 @@ docs/DynamicSecretUpdateEks.md docs/DynamicSecretUpdateGcp.md docs/DynamicSecretUpdateGithub.md docs/DynamicSecretUpdateGke.md +docs/DynamicSecretUpdateGoogleWorkspace.md docs/DynamicSecretUpdateHanaDb.md docs/DynamicSecretUpdateK8s.md docs/DynamicSecretUpdateLdap.md @@ -354,6 +356,7 @@ docs/GatewayCreateProducerGithub.md docs/GatewayCreateProducerGithubOutput.md docs/GatewayCreateProducerGke.md docs/GatewayCreateProducerGkeOutput.md +docs/GatewayCreateProducerGoogleWorkspaceOutput.md docs/GatewayCreateProducerHanaDb.md docs/GatewayCreateProducerHanaDbOutput.md docs/GatewayCreateProducerLdap.md @@ -414,6 +417,8 @@ docs/GatewayMigrationGetOutput.md docs/GatewayMigrationListOutput.md docs/GatewayMigrationSyncOutput.md docs/GatewayMigrationUpdateOutput.md +docs/GatewayPartialUpdateK8SAuthConfig.md +docs/GatewayPartialUpdateK8SAuthConfigOutput.md docs/GatewayRevokeTmpUsers.md docs/GatewayStartProducer.md docs/GatewayStartProducerOutput.md @@ -1136,6 +1141,7 @@ src/main/java/io/akeyless/client/model/DynamicSecretCreateEks.java src/main/java/io/akeyless/client/model/DynamicSecretCreateGcp.java src/main/java/io/akeyless/client/model/DynamicSecretCreateGithub.java src/main/java/io/akeyless/client/model/DynamicSecretCreateGke.java +src/main/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspace.java src/main/java/io/akeyless/client/model/DynamicSecretCreateHanaDb.java src/main/java/io/akeyless/client/model/DynamicSecretCreateK8s.java src/main/java/io/akeyless/client/model/DynamicSecretCreateLdap.java @@ -1173,6 +1179,7 @@ src/main/java/io/akeyless/client/model/DynamicSecretUpdateEks.java src/main/java/io/akeyless/client/model/DynamicSecretUpdateGcp.java src/main/java/io/akeyless/client/model/DynamicSecretUpdateGithub.java src/main/java/io/akeyless/client/model/DynamicSecretUpdateGke.java +src/main/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspace.java src/main/java/io/akeyless/client/model/DynamicSecretUpdateHanaDb.java src/main/java/io/akeyless/client/model/DynamicSecretUpdateK8s.java src/main/java/io/akeyless/client/model/DynamicSecretUpdateLdap.java @@ -1261,6 +1268,7 @@ src/main/java/io/akeyless/client/model/GatewayCreateProducerGithub.java src/main/java/io/akeyless/client/model/GatewayCreateProducerGithubOutput.java src/main/java/io/akeyless/client/model/GatewayCreateProducerGke.java src/main/java/io/akeyless/client/model/GatewayCreateProducerGkeOutput.java +src/main/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutput.java src/main/java/io/akeyless/client/model/GatewayCreateProducerHanaDb.java src/main/java/io/akeyless/client/model/GatewayCreateProducerHanaDbOutput.java src/main/java/io/akeyless/client/model/GatewayCreateProducerLdap.java @@ -1321,6 +1329,8 @@ src/main/java/io/akeyless/client/model/GatewayMigrationGetOutput.java src/main/java/io/akeyless/client/model/GatewayMigrationListOutput.java src/main/java/io/akeyless/client/model/GatewayMigrationSyncOutput.java src/main/java/io/akeyless/client/model/GatewayMigrationUpdateOutput.java +src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfig.java +src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutput.java src/main/java/io/akeyless/client/model/GatewayRevokeTmpUsers.java src/main/java/io/akeyless/client/model/GatewayStartProducer.java src/main/java/io/akeyless/client/model/GatewayStartProducerOutput.java @@ -1790,15 +1800,8 @@ src/main/java/io/akeyless/client/model/WindowsService.java src/main/java/io/akeyless/client/model/WindowsServiceAttributes.java src/main/java/io/akeyless/client/model/WindowsTargetDetails.java src/main/java/io/akeyless/client/model/ZeroSSLTargetDetails.java -src/test/java/io/akeyless/client/model/AllAnalyticsDataTest.java -src/test/java/io/akeyless/client/model/CertificateAnalyticAggregationTest.java -src/test/java/io/akeyless/client/model/ClientUsageInfoTest.java -src/test/java/io/akeyless/client/model/ClientsUsageReportTest.java -src/test/java/io/akeyless/client/model/EventForwarderCreateServiceNowTest.java -src/test/java/io/akeyless/client/model/EventForwarderCreateSlackTest.java -src/test/java/io/akeyless/client/model/EventForwarderUpdateServiceNowTest.java -src/test/java/io/akeyless/client/model/EventForwarderUpdateSlackTest.java -src/test/java/io/akeyless/client/model/GetAnalyticsDataTest.java -src/test/java/io/akeyless/client/model/ItemSraStatusTest.java -src/test/java/io/akeyless/client/model/RevokeCertificateTest.java -src/test/java/io/akeyless/client/model/UsageReportSummaryTest.java +src/test/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspaceTest.java +src/test/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspaceTest.java +src/test/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutputTest.java +src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutputTest.java +src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigTest.java diff --git a/README.md b/README.md index 0dac424e..8e23007f 100644 --- a/README.md +++ b/README.md @@ -198,6 +198,7 @@ Class | Method | HTTP request | Description *V2Api* | [**dynamicSecretCreateGcp**](docs/V2Api.md#dynamicSecretCreateGcp) | **POST** /dynamic-secret-create-gcp | *V2Api* | [**dynamicSecretCreateGithub**](docs/V2Api.md#dynamicSecretCreateGithub) | **POST** /dynamic-secret-create-github | *V2Api* | [**dynamicSecretCreateGke**](docs/V2Api.md#dynamicSecretCreateGke) | **POST** /dynamic-secret-create-gke | +*V2Api* | [**dynamicSecretCreateGoogleWorkspace**](docs/V2Api.md#dynamicSecretCreateGoogleWorkspace) | **POST** /dynamic-secret-create-google-workspace | *V2Api* | [**dynamicSecretCreateHanaDb**](docs/V2Api.md#dynamicSecretCreateHanaDb) | **POST** /dynamic-secret-create-hanadb | *V2Api* | [**dynamicSecretCreateK8s**](docs/V2Api.md#dynamicSecretCreateK8s) | **POST** /dynamic-secret-create-k8s | *V2Api* | [**dynamicSecretCreateLdap**](docs/V2Api.md#dynamicSecretCreateLdap) | **POST** /dynamic-secret-create-ldap | @@ -230,6 +231,7 @@ Class | Method | HTTP request | Description *V2Api* | [**dynamicSecretUpdateGcp**](docs/V2Api.md#dynamicSecretUpdateGcp) | **POST** /dynamic-secret-update-gcp | *V2Api* | [**dynamicSecretUpdateGithub**](docs/V2Api.md#dynamicSecretUpdateGithub) | **POST** /dynamic-secret-update-github | *V2Api* | [**dynamicSecretUpdateGke**](docs/V2Api.md#dynamicSecretUpdateGke) | **POST** /dynamic-secret-update-gke | +*V2Api* | [**dynamicSecretUpdateGoogleWorkspace**](docs/V2Api.md#dynamicSecretUpdateGoogleWorkspace) | **POST** /dynamic-secret-update-google-workspace | *V2Api* | [**dynamicSecretUpdateHanaDb**](docs/V2Api.md#dynamicSecretUpdateHanaDb) | **POST** /dynamic-secret-update-hana | *V2Api* | [**dynamicSecretUpdateK8s**](docs/V2Api.md#dynamicSecretUpdateK8s) | **POST** /dynamic-secret-update-k8s | *V2Api* | [**dynamicSecretUpdateLdap**](docs/V2Api.md#dynamicSecretUpdateLdap) | **POST** /dynamic-secret-update-ldap | @@ -759,6 +761,7 @@ Class | Method | HTTP request | Description - [DynamicSecretCreateGcp](docs/DynamicSecretCreateGcp.md) - [DynamicSecretCreateGithub](docs/DynamicSecretCreateGithub.md) - [DynamicSecretCreateGke](docs/DynamicSecretCreateGke.md) + - [DynamicSecretCreateGoogleWorkspace](docs/DynamicSecretCreateGoogleWorkspace.md) - [DynamicSecretCreateHanaDb](docs/DynamicSecretCreateHanaDb.md) - [DynamicSecretCreateK8s](docs/DynamicSecretCreateK8s.md) - [DynamicSecretCreateLdap](docs/DynamicSecretCreateLdap.md) @@ -796,6 +799,7 @@ Class | Method | HTTP request | Description - [DynamicSecretUpdateGcp](docs/DynamicSecretUpdateGcp.md) - [DynamicSecretUpdateGithub](docs/DynamicSecretUpdateGithub.md) - [DynamicSecretUpdateGke](docs/DynamicSecretUpdateGke.md) + - [DynamicSecretUpdateGoogleWorkspace](docs/DynamicSecretUpdateGoogleWorkspace.md) - [DynamicSecretUpdateHanaDb](docs/DynamicSecretUpdateHanaDb.md) - [DynamicSecretUpdateK8s](docs/DynamicSecretUpdateK8s.md) - [DynamicSecretUpdateLdap](docs/DynamicSecretUpdateLdap.md) @@ -884,6 +888,7 @@ Class | Method | HTTP request | Description - [GatewayCreateProducerGithubOutput](docs/GatewayCreateProducerGithubOutput.md) - [GatewayCreateProducerGke](docs/GatewayCreateProducerGke.md) - [GatewayCreateProducerGkeOutput](docs/GatewayCreateProducerGkeOutput.md) + - [GatewayCreateProducerGoogleWorkspaceOutput](docs/GatewayCreateProducerGoogleWorkspaceOutput.md) - [GatewayCreateProducerHanaDb](docs/GatewayCreateProducerHanaDb.md) - [GatewayCreateProducerHanaDbOutput](docs/GatewayCreateProducerHanaDbOutput.md) - [GatewayCreateProducerLdap](docs/GatewayCreateProducerLdap.md) @@ -944,6 +949,8 @@ Class | Method | HTTP request | Description - [GatewayMigrationListOutput](docs/GatewayMigrationListOutput.md) - [GatewayMigrationSyncOutput](docs/GatewayMigrationSyncOutput.md) - [GatewayMigrationUpdateOutput](docs/GatewayMigrationUpdateOutput.md) + - [GatewayPartialUpdateK8SAuthConfig](docs/GatewayPartialUpdateK8SAuthConfig.md) + - [GatewayPartialUpdateK8SAuthConfigOutput](docs/GatewayPartialUpdateK8SAuthConfigOutput.md) - [GatewayRevokeTmpUsers](docs/GatewayRevokeTmpUsers.md) - [GatewayStartProducer](docs/GatewayStartProducer.md) - [GatewayStartProducerOutput](docs/GatewayStartProducerOutput.md) diff --git a/api/openapi.yaml b/api/openapi.yaml index 6c2dca0b..e6c1ef5b 100644 --- a/api/openapi.yaml +++ b/api/openapi.yaml @@ -2694,6 +2694,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /dynamic-secret-create-google-workspace: + post: + operationId: dynamicSecretCreateGoogleWorkspace + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretCreateGoogleWorkspace' + required: true + responses: + "201": + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretCreateOutput' + description: dynamicSecretCreateGoogleWorkspaceResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /dynamic-secret-create-hanadb: post: operationId: dynamicSecretCreateHanaDb @@ -3160,7 +3189,13 @@ paths: x-accepts: application/json /dynamic-secret-get: post: - operationId: DynamicSecretGet + operationId: dynamicSecretGet + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretGet' + required: true responses: "200": content: @@ -3178,6 +3213,8 @@ paths: field. tags: - v2 + x-codegen-request-body-name: body + x-contentType: application/json x-accepts: application/json /dynamic-secret-get-value: post: @@ -3612,6 +3649,35 @@ paths: x-codegen-request-body-name: body x-contentType: application/json x-accepts: application/json + /dynamic-secret-update-google-workspace: + post: + operationId: dynamicSecretUpdateGoogleWorkspace + requestBody: + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretUpdateGoogleWorkspace' + required: true + responses: + "201": + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretUpdateOutput' + description: dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. + default: + content: + application/json: + schema: + $ref: '#/components/schemas/JSONError' + description: |- + errorResponse wraps any error to return it as a JSON object with one "error" + field. + tags: + - v2 + x-codegen-request-body-name: body + x-contentType: application/json + x-accepts: application/json /dynamic-secret-update-hana: post: operationId: dynamicSecretUpdateHanaDb @@ -5714,7 +5780,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/gatewayGetK8SAuthConfigOutput' + $ref: '#/components/schemas/GatewayGetK8SAuthConfigOutput' description: gatewayGetK8SAuthConfigResponse wraps response body. default: content: @@ -7271,7 +7337,7 @@ paths: application/json: schema: additionalProperties: - type: string + type: object type: object description: getDynamicSecretValueResponse wraps response body. default: @@ -7507,7 +7573,7 @@ paths: application/json: schema: additionalProperties: - type: string + type: object type: object description: getSecretValueResponse wraps response body. default: @@ -9182,7 +9248,7 @@ paths: application/json: schema: additionalProperties: - type: string + type: object type: object description: rotatedSecretGetValueResponse wraps response body. default: @@ -12101,7 +12167,7 @@ paths: content: application/json: schema: - $ref: '#/components/schemas/validateTokenOutput' + $ref: '#/components/schemas/ValidateTokenOutput' description: validateTokenResponse wraps response body. "401": content: @@ -12935,6 +13001,12 @@ components: schema: $ref: '#/components/schemas/dynamicSecretCreateOutput' description: dynamicSecretCreateGkeResponse wraps response body. + dynamicSecretCreateGoogleWorkspaceResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretCreateOutput' + description: dynamicSecretCreateGoogleWorkspaceResponse wraps response body. dynamicSecretCreateHanaDbResponse: content: application/json: @@ -13131,6 +13203,12 @@ components: schema: $ref: '#/components/schemas/dynamicSecretUpdateOutput' description: dynamicSecretUpdateGkeResponse wraps response body. + dynamicSecretUpdateGoogleWorkspaceResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/dynamicSecretUpdateOutput' + description: dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. dynamicSecretUpdateHanaDbResponse: content: application/json: @@ -13427,6 +13505,12 @@ components: schema: $ref: '#/components/schemas/gatewayCreateProducerGkeOutput' description: gatewayCreateProducerGkeResponse wraps response body. + gatewayCreateProducerGoogleWorkspaceResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/gatewayCreateProducerGoogleWorkspaceOutput' + description: gatewayCreateProducerGoogleWorkspaceResponse wraps response body. gatewayCreateProducerHanaDbResponse: content: application/json: @@ -13557,7 +13641,7 @@ components: content: application/json: schema: - $ref: '#/components/schemas/gatewayGetK8SAuthConfigOutput' + $ref: '#/components/schemas/GatewayGetK8SAuthConfigOutput' description: gatewayGetK8SAuthConfigResponse wraps response body. gatewayGetLdapAuthConfigResponse: content: @@ -13639,6 +13723,12 @@ components: schema: $ref: '#/components/schemas/GatewayMigrationUpdateOutput' description: gatewayMigrationUpdateResponse wraps response body. + gatewayPartialUpdateK8SAuthConfigResponse: + content: + application/json: + schema: + $ref: '#/components/schemas/gatewayPartialUpdateK8SAuthConfigOutput' + description: gatewayPartialUpdateK8SAuthConfigResponse wraps response body. gatewayRevokeTmpUsersResponse: content: {} description: gatewayRevokeTmpUsersResponse wraps response body. @@ -13880,7 +13970,7 @@ components: application/json: schema: additionalProperties: - type: string + type: object type: object description: getDynamicSecretValueResponse wraps response body. getEventForwarderResponse: @@ -13944,7 +14034,7 @@ components: application/json: schema: additionalProperties: - type: string + type: object type: object description: getSecretValueResponse wraps response body. getTagsResponse: @@ -14290,7 +14380,7 @@ components: application/json: schema: additionalProperties: - type: string + type: object type: object description: rotatedSecretGetValueResponse wraps response body. rotatedSecretListResponse: @@ -14855,7 +14945,7 @@ components: content: application/json: schema: - $ref: '#/components/schemas/validateTokenOutput' + $ref: '#/components/schemas/ValidateTokenOutput' description: validateTokenResponse wraps response body. verifyDataWithClassicKeyResponse: content: @@ -19238,7 +19328,7 @@ components: locality: locality allowed-domains: allowed-domains allow-any-name: true - ttl: 0 + ttl: ttl token: token client-flag: true create-public-crl: true @@ -19428,8 +19518,7 @@ components: description: The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs - format: int64 - type: integer + type: string x-go-name: MaxTTL uid-token: description: The universal identity token, Required only for universal_identity @@ -19665,13 +19754,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -19717,6 +19806,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -19731,6 +19821,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -19755,13 +19846,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -19803,16 +19902,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -19882,12 +19976,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -20083,6 +20179,9 @@ components: cloud_service_provider: type: string x-go-name: CloudServiceProvider + cluster_mode: + type: boolean + x-go-name: ClusterMode connection_type: type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types @@ -20287,6 +20386,24 @@ components: gke_service_account_name: type: string x-go-name: GKEServiceAccountName + google_workspace_access_mode: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + google_workspace_admin_name: + type: string + x-go-name: GWSAdminName + google_workspace_group_name: + type: string + x-go-name: GWSGroupName + google_workspace_group_role: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + google_workspace_role_name: + type: string + x-go-name: RoleName + google_workspace_role_scope: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config grant_types: items: type: string @@ -20352,6 +20469,9 @@ components: k8s_cluster_endpoint: type: string x-go-name: K8sClusterEndpoint + k8s_cluster_name: + type: string + x-go-name: K8sClusterName k8s_dynamic_mode: description: |- when native k8s is in dynamic mode, user can define allowed namespaces, @@ -20738,6 +20858,7 @@ components: db_name: db_name db_user_name: db_user_name db_server_certificates: db_server_certificates + cluster_mode: true db_port: db_port db_server_name: db_server_name db_client_id: db_client_id @@ -20745,6 +20866,9 @@ components: cloud_service_provider: type: string x-go-name: CloudServiceProvider + cluster_mode: + type: boolean + x-go-name: ClusterMode connection_type: type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types @@ -21203,8 +21327,8 @@ components: emails example: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 properties: domain_suffix_length: description: |- @@ -21572,6 +21696,15 @@ components: GWClusterStatus: type: string x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + GWSAccessMode: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + GWSGroupRoleType: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + GWSRoleScope: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config GatewayBasicInfo: example: cluster_url: cluster_url @@ -21594,6 +21727,118 @@ components: x-go-name: ClusterUrl type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + GatewayGetK8SAuthConfigOutput: + example: + k8s_ca_cert: k8s_ca_cert + k8s_host: k8s_host + k8s_token_reviewer_jwt: k8s_token_reviewer_jwt + k8s_auth_type: k8s_auth_type + cluster_api_type: cluster_api_type + k8s_issuer: k8s_issuer + protection_key: protection_key + auth_method_access_id: auth_method_access_id + k8s_client_cert_data: k8s_client_cert_data + k8s_pub_keys_pem: + - k8s_pub_keys_pem + - k8s_pub_keys_pem + k8s_client_key_data: k8s_client_key_data + rancher_api_key: rancher_api_key + am_token_expiration: 0 + name: name + auth_method_prv_key_pem: auth_method_prv_key_pem + disable_iss_validation: true + id: id + rancher_cluster_id: rancher_cluster_id + use_local_ca_jwt: true + properties: + am_token_expiration: + description: AuthMethodTokenExpiration is time in seconds of expiration + of the Akeyless Kube Auth Method token + format: int64 + type: integer + x-go-name: AuthMethodTokenExpiration + auth_method_access_id: + description: AuthMethodAccessId of the Kubernetes auth method + type: string + x-go-name: AuthMethodAccessId + auth_method_prv_key_pem: + description: |- + AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the + Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method + type: string + x-go-name: AuthMethodSigningKey + cluster_api_type: + description: ClusterApiType defines types of API access to cluster + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/akeyless-api/gator + disable_iss_validation: + description: DisableISSValidation is optional parameter to disable ISS validation + type: boolean + x-go-name: DisableISSValidation + id: + type: string + x-go-name: Id + k8s_auth_type: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types + k8s_ca_cert: + description: K8SCACert is the CA Cert to use to call into the kubernetes + API + type: string + x-go-name: K8SCACert + k8s_client_cert_data: + description: K8sClientCertData is the client certificate for k8s client + certificate authentication + type: string + x-go-name: K8sClientCertData + k8s_client_key_data: + description: K8sClientKeyData is the client key for k8s client certificate + authentication + type: string + x-go-name: K8sClientKeyData + k8s_host: + description: K8SHost is the url string for the kubernetes API + type: string + x-go-name: K8SHost + k8s_issuer: + description: K8SIssuer is the claim that specifies who issued the Kubernetes + token + type: string + x-go-name: K8SIssuer + k8s_pub_keys_pem: + description: K8SPublicKeysPEM is the list of public key in PEM format + items: + type: string + type: array + x-go-name: K8SPublicKeysPEM + k8s_token_reviewer_jwt: + description: K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used + during TokenReview API call + type: string + x-go-name: K8STokenReviewerJWT + name: + type: string + x-go-name: Name + protection_key: + type: string + x-go-name: ProtectionKey + rancher_api_key: + description: RancherApiKey the bear token for clusterApiTypeRancher + type: string + x-go-name: RancherApiKey + rancher_cluster_id: + description: RancherClusterId cluster id as define in rancher (in case of + clusterApiTypeRancher) + type: string + x-go-name: RancherClusterId + use_local_ca_jwt: + description: |- + UseLocalCAJwt is an optional parameter to set defaulting to using + the local service account when running in a Kubernetes pod + type: boolean + x-go-name: UseLocalCAJwt + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands GatewayMessageQueueInfo: example: queue_name: queue_name @@ -22112,7 +22357,7 @@ components: extra-extensions: extra-extensions json: false csr-data-base64: csr-data-base64 - ttl: 0 + ttl: ttl uid-token: uid-token common-name: common-name token: token @@ -22166,8 +22411,7 @@ components: ttl: description: Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) - format: int64 - type: integer + type: string x-go-name: Ttl uid-token: description: The universal identity token, Required only for universal_identity @@ -22312,6 +22556,7 @@ components: private_key: private_key username: username native_k8s_target_details: + k8s_cluster_name: k8s_cluster_name k8s_client_key_data: k8s_client_key_data k8s_cluster_ca_certificate: k8s_cluster_ca_certificate k8s_bearer_token: k8s_bearer_token @@ -22442,6 +22687,7 @@ components: db_name: db_name db_user_name: db_user_name db_server_certificates: db_server_certificates + cluster_mode: true db_port: db_port db_server_name: db_server_name db_client_id: db_client_id @@ -22501,7 +22747,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -22515,7 +22761,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -23044,7 +23290,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -23058,7 +23304,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -23075,7 +23321,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -23091,7 +23337,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -23108,7 +23354,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name cert_issuer_signer_key_name: cert_issuer_signer_key_name - item_id: 2 + item_id: 6 item_tags: - item_tags - item_tags @@ -23198,13 +23444,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 item_name: item_name creation_date: 2000-01-23T04:56:07.000+00:00 last_rotation_date: 2000-01-23T04:56:07.000+00:00 @@ -23227,7 +23473,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username oidc_client_info: audience: @@ -23301,6 +23547,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -23342,13 +23594,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name importer_info: version: 4 external_item_id: external_item_id @@ -23635,8 +23880,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -23735,7 +23980,7 @@ components: allowed_user_key_lengths: key: 2 cert_issuer_type: cert_issuer_type - last_version: 6 + last_version: 3 next_rotation_date: 2000-01-23T04:56:07.000+00:00 delete_protection: true bastion_details: @@ -23941,7 +24186,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username oidc_client_info: audience: @@ -24015,6 +24260,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -24056,13 +24307,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name importer_info: version: 4 external_item_id: external_item_id @@ -24349,8 +24593,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -24485,32 +24729,27 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types ItemSraStatus: example: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 properties: - bastion_access_id: - type: string - x-go-name: BastionAccessId - bastion_cluster_name: - type: string - x-go-name: BastionClusterName - bastion_instance_id: - type: string - x-go-name: BastionInstanceId - is_in_used: + count_info: + additionalProperties: + additionalProperties: + format: int64 + type: integer + type: object + type: object + x-go-name: CountInfo + is_in_use: type: boolean - x-go-name: IsInUsed - session_id: - type: string - x-go-name: SessionId - time: + x-go-name: IsInUse + last_used_item: format: date-time type: string - x-go-name: Time + x-go-name: LastUsedTime type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types ItemState: @@ -24529,7 +24768,7 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 properties: assoc_id: type: string @@ -24566,7 +24805,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -26324,7 +26563,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -26338,7 +26577,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -26355,7 +26594,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -26371,7 +26610,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -26388,7 +26627,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name cert_issuer_signer_key_name: cert_issuer_signer_key_name - item_id: 2 + item_id: 6 item_tags: - item_tags - item_tags @@ -26478,13 +26717,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 item_name: item_name creation_date: 2000-01-23T04:56:07.000+00:00 last_rotation_date: 2000-01-23T04:56:07.000+00:00 @@ -26507,7 +26746,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username oidc_client_info: audience: @@ -26581,6 +26820,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -26622,13 +26867,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name importer_info: version: 4 external_item_id: external_item_id @@ -26915,8 +27153,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -27015,7 +27253,7 @@ components: allowed_user_key_lengths: key: 2 cert_issuer_type: cert_issuer_type - last_version: 6 + last_version: 3 next_rotation_date: 2000-01-23T04:56:07.000+00:00 delete_protection: true bastion_details: @@ -27075,7 +27313,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -27089,7 +27327,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -27106,7 +27344,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -27122,7 +27360,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -27139,7 +27377,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name cert_issuer_signer_key_name: cert_issuer_signer_key_name - item_id: 2 + item_id: 6 item_tags: - item_tags - item_tags @@ -27229,13 +27467,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 item_name: item_name creation_date: 2000-01-23T04:56:07.000+00:00 last_rotation_date: 2000-01-23T04:56:07.000+00:00 @@ -27258,7 +27496,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username oidc_client_info: audience: @@ -27332,6 +27570,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -27373,13 +27617,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name importer_info: version: 4 external_item_id: external_item_id @@ -27666,8 +27903,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -27766,7 +28003,7 @@ components: allowed_user_key_lengths: key: 2 cert_issuer_type: cert_issuer_type - last_version: 6 + last_version: 3 next_rotation_date: 2000-01-23T04:56:07.000+00:00 delete_protection: true bastion_details: @@ -27848,7 +28085,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -27862,7 +28099,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -27879,7 +28116,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -27895,7 +28132,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -27912,7 +28149,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name cert_issuer_signer_key_name: cert_issuer_signer_key_name - item_id: 2 + item_id: 6 item_tags: - item_tags - item_tags @@ -28002,13 +28239,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 item_name: item_name creation_date: 2000-01-23T04:56:07.000+00:00 last_rotation_date: 2000-01-23T04:56:07.000+00:00 @@ -28031,7 +28268,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username oidc_client_info: audience: @@ -28105,6 +28342,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -28146,13 +28389,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name importer_info: version: 4 external_item_id: external_item_id @@ -28439,8 +28675,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -28539,7 +28775,7 @@ components: allowed_user_key_lengths: key: 2 cert_issuer_type: cert_issuer_type - last_version: 6 + last_version: 3 next_rotation_date: 2000-01-23T04:56:07.000+00:00 delete_protection: true bastion_details: @@ -28599,7 +28835,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -28613,7 +28849,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -28630,7 +28866,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -28646,7 +28882,7 @@ components: - target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -28663,7 +28899,7 @@ components: modification_date: 2000-01-23T04:56:07.000+00:00 protection_key_name: protection_key_name cert_issuer_signer_key_name: cert_issuer_signer_key_name - item_id: 2 + item_id: 6 item_tags: - item_tags - item_tags @@ -28753,13 +28989,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 item_name: item_name creation_date: 2000-01-23T04:56:07.000+00:00 last_rotation_date: 2000-01-23T04:56:07.000+00:00 @@ -28782,7 +29018,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username oidc_client_info: audience: @@ -28856,6 +29092,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -28897,13 +29139,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name importer_info: version: 4 external_item_id: external_item_id @@ -29190,8 +29425,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -29290,7 +29525,7 @@ components: allowed_user_key_lengths: key: 2 cert_issuer_type: cert_issuer_type - last_version: 6 + last_version: 3 next_rotation_date: 2000-01-23T04:56:07.000+00:00 delete_protection: true bastion_details: @@ -29518,7 +29753,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -29532,7 +29767,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -29583,7 +29818,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -29597,7 +29832,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -30530,6 +30765,7 @@ components: x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types NativeK8sTargetDetails: example: + k8s_cluster_name: k8s_cluster_name k8s_client_key_data: k8s_client_key_data k8s_cluster_ca_certificate: k8s_cluster_ca_certificate k8s_bearer_token: k8s_bearer_token @@ -30557,6 +30793,9 @@ components: k8s_cluster_endpoint: type: string x-go-name: K8sClusterEndpoint + k8s_cluster_name: + type: string + x-go-name: K8sClusterName use_gw_service_account: type: boolean x-go-name: K8sUseDefaultIdentity @@ -30584,7 +30823,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -30598,7 +30837,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -32615,6 +32854,12 @@ components: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -32656,13 +32901,6 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name properties: account_id: type: string @@ -32748,7 +32986,7 @@ components: ssh_user: type: string x-go-name: SSHUser - status: + status_info: $ref: '#/components/schemas/ItemSraStatus' target_hosts: items: @@ -32978,7 +33216,7 @@ components: websites: - websites - websites - max_versions: 3 + max_versions: 6 username: username properties: format: @@ -33159,7 +33397,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -33173,7 +33411,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -33315,7 +33553,7 @@ components: target_name: target_name access_date: 2000-01-23T04:56:07.000+00:00 creation_date: 2000-01-23T04:56:07.000+00:00 - version: 3 + version: 7 customer_fragment_id: customer_fragment_id item_version_state: item_version_state with_customer_fragment: true @@ -33440,6 +33678,7 @@ components: private_key: private_key username: username native_k8s_target_details: + k8s_cluster_name: k8s_cluster_name k8s_client_key_data: k8s_client_key_data k8s_cluster_ca_certificate: k8s_cluster_ca_certificate k8s_bearer_token: k8s_bearer_token @@ -33570,6 +33809,7 @@ components: db_name: db_name db_user_name: db_user_name db_server_certificates: db_server_certificates + cluster_mode: true db_port: db_port db_server_name: db_server_name db_client_id: db_client_id @@ -33704,8 +33944,8 @@ components: tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -33920,7 +34160,7 @@ components: locality: locality allowed-domains: allowed-domains allow-any-name: true - ttl: 0 + ttl: ttl token: token client-flag: true create-public-crl: true @@ -34115,8 +34355,7 @@ components: description: The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs - format: int64 - type: integer + type: string x-go-name: MaxTTL uid-token: description: The universal identity token, Required only for universal_identity @@ -34291,14 +34530,40 @@ components: x-go-name: VersionId type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + ValidateTokenOutput: + example: + reason: reason + last_rotate: last_rotate + is_valid: true + expiration: expiration + ttl: 0 + properties: + expiration: + type: string + x-go-name: ExpirationTime + is_valid: + type: boolean + x-go-name: IsValid + last_rotate: + type: string + x-go-name: LastRotate + reason: + type: string + x-go-name: Reason + ttl: + format: int32 + type: integer + x-go-name: TTL + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands VaultlessTokenizerInfo: example: key_name: key_name tweak: tweak email_tokenizer_info: fixed_domain_suffix: fixed_domain_suffix - keep_prefix_length: 1 - domain_suffix_length: 6 + keep_prefix_length: 2 + domain_suffix_length: 1 template_type: template_type tweak_type: tweak_type regexp_tokenizer_info: @@ -36813,6 +37078,10 @@ components: Azure) type: string x-go-name: CloudServiceProvider + cluster-mode: + description: Cluster Mode + type: boolean + x-go-name: ClusterMode comment: description: Deprecated - use description type: string @@ -38214,6 +38483,10 @@ components: description: K8S cluster URL endpoint type: string x-go-name: ClusterEndpoint + k8s-cluster-name: + description: K8S cluster name + type: string + x-go-name: ClusterName k8s-cluster-token: default: dummy_val description: K8S cluster Bearer token @@ -41718,6 +41991,87 @@ components: - name type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + dynamicSecretCreateGoogleWorkspace: + description: dynamicSecretCreateGoogleWorkspace is a command that creates Google + Workspace dynamic secret + properties: + access-mode: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + admin-name: + description: Admin user email + type: string + x-go-name: AdminName + delete_protection: + description: Protection from accidental deletion of this item [true/false] + type: string + x-go-name: ItemProtected + description: + description: Description of the object + type: string + x-go-name: Description + gcp-key: + description: Base64-encoded service account private key text + type: string + x-go-name: ServiceAccountKey + group-name: + description: A group email, relevant only for group access-mode + type: string + x-go-name: GroupName + group-role-type: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + name: + description: Dynamic secret name + type: string + x-go-name: ProducerName + producer-encryption-key-name: + description: Dynamic producer encryption key + type: string + x-go-name: ProducerEncryptionKey + role-name: + description: Name of the admin role to assign to the user, relevant only + for role access-mode + type: string + x-go-name: RoleName + role-scope: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + tags: + description: Add tags attached to this object + items: + type: string + type: array + x-go-name: Tags + target-name: + description: Name of existing target to use in producer creation + type: string + x-go-name: TargetName + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + user-ttl: + default: 60m + description: User TTL + type: string + x-go-name: UserTtl + required: + - access-mode + - admin-name + - name + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands dynamicSecretCreateHanaDb: description: dynamicSecretCreateHanaDb is a command that creates hanadb dynamic secret @@ -41858,6 +42212,10 @@ components: description: K8S cluster URL endpoint type: string x-go-name: ClusterEndpoint + k8s-cluster-name: + description: K8S cluster name + type: string + x-go-name: ClusterName k8s-cluster-token: description: K8S cluster Bearer token type: string @@ -42577,13 +42935,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -42629,6 +42987,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -42643,6 +43002,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -42667,13 +43027,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -42715,16 +43083,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -42794,12 +43157,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -43793,7 +44158,7 @@ components: type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands dynamicSecretGet: - description: DynamicSecretGet is a command that returns dynamic secret details + description: dynamicSecretGet is a command that returns dynamic secret details properties: json: default: false @@ -45064,6 +45429,91 @@ components: - name type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + dynamicSecretUpdateGoogleWorkspace: + description: dynamicSecretUpdateGoogleWorkspace is a command that updates a + Google Workspace dynamic secret + properties: + access-mode: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + admin-name: + description: Admin user email + type: string + x-go-name: AdminName + delete_protection: + description: Protection from accidental deletion of this item [true/false] + type: string + x-go-name: ItemProtected + description: + description: Description of the object + type: string + x-go-name: Description + gcp-key: + description: Base64-encoded service account private key text + type: string + x-go-name: ServiceAccountKey + group-name: + description: A group email, relevant only for group access-mode + type: string + x-go-name: GroupName + group-role-type: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + name: + description: Dynamic secret name + type: string + x-go-name: ProducerName + new-name: + description: Dynamic secret new name + type: string + x-go-name: DsNewName + producer-encryption-key-name: + description: Dynamic producer encryption key + type: string + x-go-name: ProducerEncryptionKey + role-name: + description: Name of the admin role to assign to the user, relevant only + for role access-mode + type: string + x-go-name: RoleName + role-scope: + type: string + x-go-package: akeyless.io/akeyless-main-repo/go/src/producer/config + tags: + description: Add tags attached to this object + items: + type: string + type: array + x-go-name: Tags + target-name: + description: Name of existing target to use in producer creation + type: string + x-go-name: TargetName + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + user-ttl: + default: 60m + description: User TTL + type: string + x-go-name: UserTtl + required: + - access-mode + - admin-name + - name + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands dynamicSecretUpdateHanaDb: description: dynamicSecretUpdateHanaDb is a command that updates hanadb dynamic secret @@ -45208,6 +45658,10 @@ components: description: K8S cluster URL endpoint type: string x-go-name: ClusterEndpoint + k8s-cluster-name: + description: K8S cluster name + type: string + x-go-name: ClusterName k8s-cluster-token: description: K8S cluster Bearer token type: string @@ -45951,13 +46405,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -46003,6 +46457,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -46017,6 +46472,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -46041,13 +46497,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -46089,16 +46553,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -46168,12 +46627,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -48103,7 +48564,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -48117,7 +48578,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -49294,13 +49755,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -49346,6 +49807,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -49360,6 +49822,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -49384,13 +49847,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -49432,16 +49903,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -49511,12 +49977,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -49744,13 +50212,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -49796,6 +50264,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -49810,6 +50279,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -49834,13 +50304,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -49882,16 +50360,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -49961,12 +50434,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -50180,13 +50655,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -50232,6 +50707,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -50246,6 +50722,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -50270,13 +50747,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -50318,16 +50803,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -50397,12 +50877,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -50580,13 +51062,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -50632,6 +51114,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -50646,6 +51129,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -50670,13 +51154,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -50718,16 +51210,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -50797,12 +51284,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -50970,13 +51459,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -51022,6 +51511,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -51036,6 +51526,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -51060,13 +51551,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -51108,16 +51607,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -51187,12 +51681,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -51372,13 +51868,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -51424,6 +51920,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -51438,6 +51935,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -51462,13 +51960,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -51510,16 +52016,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -51589,12 +52090,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -51752,13 +52255,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -51804,6 +52307,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -51818,6 +52322,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -51842,13 +52347,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -51890,16 +52403,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -51969,12 +52477,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -52167,13 +52677,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -52219,6 +52729,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -52233,6 +52744,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -52257,13 +52769,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -52305,16 +52825,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -52384,12 +52899,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -52562,13 +53079,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -52614,6 +53131,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -52628,6 +53146,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -52652,13 +53171,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -52700,16 +53227,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -52779,12 +53301,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -52959,13 +53483,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -53011,6 +53535,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -53025,6 +53550,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -53049,13 +53575,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -53097,16 +53631,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -53176,12 +53705,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -53365,13 +53896,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -53417,6 +53948,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -53431,6 +53963,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -53455,13 +53988,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -53503,16 +54044,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -53582,12 +54118,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -53640,6 +54178,12 @@ components: $ref: '#/components/schemas/DSProducerDetails' type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + gatewayCreateProducerGoogleWorkspaceOutput: + properties: + producer_details: + $ref: '#/components/schemas/DSProducerDetails' + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands gatewayCreateProducerHanaDb: description: 'gatewayCreateProducerHanaDb is a command that creates hanadb producer [Deprecated: Use dynamic-secret-create-hanadb command]' @@ -53788,13 +54332,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -53840,6 +54384,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -53854,6 +54399,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -53878,13 +54424,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -53926,16 +54480,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -54005,12 +54554,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -54194,13 +54745,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -54246,6 +54797,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -54260,6 +54812,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -54284,13 +54837,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -54332,16 +54893,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -54411,12 +54967,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -54617,13 +55175,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -54669,6 +55227,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -54683,6 +55242,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -54707,13 +55267,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -54755,16 +55323,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -54834,12 +55397,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -55056,13 +55621,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -55108,6 +55673,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -55122,6 +55688,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -55146,13 +55713,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -55194,16 +55769,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -55273,12 +55843,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -55492,13 +56064,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -55544,6 +56116,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -55558,6 +56131,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -55582,13 +56156,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -55630,16 +56212,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -55709,12 +56286,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -55793,6 +56372,10 @@ components: description: K8S cluster URL endpoint type: string x-go-name: ClusterEndpoint + k8s-cluster-name: + description: K8S cluster name + type: string + x-go-name: ClusterName k8s-cluster-token: description: K8S cluster Bearer token type: string @@ -55940,13 +56523,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -55992,6 +56575,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -56006,6 +56590,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -56030,13 +56615,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -56078,16 +56671,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -56157,12 +56745,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -56368,13 +56958,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -56420,6 +57010,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -56434,6 +57025,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -56458,13 +57050,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -56506,16 +57106,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -56585,12 +57180,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -56832,13 +57429,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -56884,6 +57481,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -56898,6 +57496,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -56922,13 +57521,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -56970,16 +57577,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -57049,12 +57651,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -57260,13 +57864,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -57312,6 +57916,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -57326,6 +57931,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -57350,13 +57956,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -57398,16 +58012,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -57477,12 +58086,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -57684,13 +58295,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -57736,6 +58347,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -57750,6 +58362,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -57774,13 +58387,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -57822,16 +58443,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -57901,12 +58517,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -58117,13 +58735,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -58169,6 +58787,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -58183,6 +58802,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -58207,13 +58827,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -58255,16 +58883,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -58334,12 +58957,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -58520,13 +59145,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -58572,6 +59197,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -58586,6 +59212,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -58610,13 +59237,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -58658,16 +59293,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -58737,12 +59367,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -58931,13 +59563,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -58983,6 +59615,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -58997,6 +59630,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -59021,13 +59655,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -59069,16 +59711,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -59148,12 +59785,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -59328,13 +59967,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -59380,6 +60019,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -59394,6 +60034,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -59418,13 +60059,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -59466,16 +60115,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -59545,12 +60189,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -59771,13 +60417,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -59823,6 +60469,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -59837,6 +60484,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -59861,13 +60509,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -59909,16 +60565,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -59988,12 +60639,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -60337,118 +60990,6 @@ components: - name type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands - gatewayGetK8SAuthConfigOutput: - example: - k8s_ca_cert: k8s_ca_cert - k8s_host: k8s_host - k8s_token_reviewer_jwt: k8s_token_reviewer_jwt - k8s_auth_type: k8s_auth_type - cluster_api_type: cluster_api_type - k8s_issuer: k8s_issuer - protection_key: protection_key - auth_method_access_id: auth_method_access_id - k8s_client_cert_data: k8s_client_cert_data - k8s_pub_keys_pem: - - k8s_pub_keys_pem - - k8s_pub_keys_pem - k8s_client_key_data: k8s_client_key_data - rancher_api_key: rancher_api_key - am_token_expiration: 0 - name: name - auth_method_prv_key_pem: auth_method_prv_key_pem - disable_iss_validation: true - id: id - rancher_cluster_id: rancher_cluster_id - use_local_ca_jwt: true - properties: - am_token_expiration: - description: AuthMethodTokenExpiration is time in seconds of expiration - of the Akeyless Kube Auth Method token - format: int64 - type: integer - x-go-name: AuthMethodTokenExpiration - auth_method_access_id: - description: AuthMethodAccessId of the Kubernetes auth method - type: string - x-go-name: AuthMethodAccessId - auth_method_prv_key_pem: - description: |- - AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the - Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method - type: string - x-go-name: AuthMethodSigningKey - cluster_api_type: - description: ClusterApiType defines types of API access to cluster - type: string - x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/akeyless-api/gator - disable_iss_validation: - description: DisableISSValidation is optional parameter to disable ISS validation - type: boolean - x-go-name: DisableISSValidation - id: - type: string - x-go-name: Id - k8s_auth_type: - type: string - x-go-package: akeyless.io/akeyless-main-repo/go/src/infra/types - k8s_ca_cert: - description: K8SCACert is the CA Cert to use to call into the kubernetes - API - type: string - x-go-name: K8SCACert - k8s_client_cert_data: - description: K8sClientCertData is the client certificate for k8s client - certificate authentication - type: string - x-go-name: K8sClientCertData - k8s_client_key_data: - description: K8sClientKeyData is the client key for k8s client certificate - authentication - type: string - x-go-name: K8sClientKeyData - k8s_host: - description: K8SHost is the url string for the kubernetes API - type: string - x-go-name: K8SHost - k8s_issuer: - description: K8SIssuer is the claim that specifies who issued the Kubernetes - token - type: string - x-go-name: K8SIssuer - k8s_pub_keys_pem: - description: K8SPublicKeysPEM is the list of public key in PEM format - items: - type: string - type: array - x-go-name: K8SPublicKeysPEM - k8s_token_reviewer_jwt: - description: K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used - during TokenReview API call - type: string - x-go-name: K8STokenReviewerJWT - name: - type: string - x-go-name: Name - protection_key: - type: string - x-go-name: ProtectionKey - rancher_api_key: - description: RancherApiKey the bear token for clusterApiTypeRancher - type: string - x-go-name: RancherApiKey - rancher_cluster_id: - description: RancherClusterId cluster id as define in rancher (in case of - clusterApiTypeRancher) - type: string - x-go-name: RancherClusterId - use_local_ca_jwt: - description: |- - UseLocalCAJwt is an optional parameter to set defaulting to using - the local service account when running in a Kubernetes pod - type: boolean - x-go-name: UseLocalCAJwt - type: object - x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands gatewayGetLdapAuthConfig: description: gatewayGetLdapAuth is a command that gets ldap auth config properties: @@ -61438,6 +61979,119 @@ components: $ref: '#/components/schemas/MigrationsConfigPart' type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + gatewayPartialUpdateK8SAuthConfig: + properties: + UseDefaultIdentityBool: + type: boolean + access-id: + description: The access ID of the Kubernetes auth method + type: string + x-go-name: AuthMethodAccessId + config-encryption-key-name: + description: Config encryption key + type: string + x-go-name: ConfigEncryptionKey + disable-issuer-validation: + description: Disable issuer validation [true/false] + type: string + x-go-name: DisableISSValidation + json: + default: false + description: Set output format to JSON + type: boolean + x-go-name: Json + k8s-auth-type: + default: token + description: K8S auth type [token/certificate]. (relevant for "native_k8s" + only) + type: string + x-go-name: K8sAuthType + k8s-ca-cert: + description: The CA Certificate (base64 encoded) to use to call into the + kubernetes API server + type: string + x-go-name: K8SCACert + k8s-client-certificate: + description: Content of the k8 client certificate (PEM format) in a Base64 + format (relevant for "native_k8s" only) + type: string + x-go-name: K8sClientCertificate + k8s-client-key: + description: Content of the k8 client private key (PEM format) in a Base64 + format (relevant for "native_k8s" only) + type: string + x-go-name: K8sClientKey + k8s-host: + description: The URL of the kubernetes API server + type: string + x-go-name: K8SHost + k8s-issuer: + description: The Kubernetes JWT issuer name. K8SIssuer is the claim that + specifies who issued the Kubernetes token + type: string + x-go-name: K8SIssuer + name: + description: K8S Auth config name + type: string + x-go-name: K8SAuthConfigName + new-name: + description: K8S Auth config new name + type: string + x-go-name: K8SAuthConfigNewName + rancher-api-key: + description: The api key used to access the TokenReview API to validate + other JWTs (relevant for "rancher" only) + type: string + x-go-name: RancherApiKey + rancher-cluster-id: + description: The cluster id as define in rancher (relevant for "rancher" + only) + type: string + x-go-name: RancherClusterId + signing-key: + description: The private key (base64 encoded) associated with the public + key defined in the Kubernetes auth + type: string + x-go-name: AuthMethodSigningKey + token: + description: Authentication token (see `/auth` and `/configure`) + type: string + x-go-name: Profile + token-exp: + description: Time in seconds of expiration of the Akeyless Kube Auth Method + token + format: int64 + type: integer + x-go-name: AuthMethodTokenExpiration + token-reviewer-jwt: + description: |- + A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for "native_k8s" only). + If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. + type: string + x-go-name: K8STokenReviewerJWT + uid-token: + description: The universal identity token, Required only for universal_identity + authentication + type: string + x-go-name: UIDToken + use-gw-service-account: + description: Use the GW's service account + type: string + x-go-name: UseDefaultIdentity + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands + gatewayPartialUpdateK8SAuthConfigOutput: + properties: + cluster_id: + type: string + x-go-name: ClusterId + parts_change: + $ref: '#/components/schemas/ConfigChange' + total_hash: + type: string + x-go-name: TotalHash + type: object + x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands gatewayRevokeTmpUsers: description: 'gatewayRevokeTmpUsers is a command that revoke producer tmp user [Deprecated: Use dynamic-secret-tmp-creds-delete command]' @@ -62497,13 +63151,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -62549,6 +63203,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -62563,6 +63218,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -62587,13 +63243,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -62635,16 +63299,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -62714,12 +63373,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -62951,13 +63612,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -63003,6 +63664,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -63017,6 +63679,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -63041,13 +63704,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -63089,16 +63760,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -63168,12 +63834,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -63391,13 +64059,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -63443,6 +64111,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -63457,6 +64126,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -63481,13 +64151,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -63529,16 +64207,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -63608,12 +64281,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -63795,13 +64470,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -63847,6 +64522,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -63861,6 +64537,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -63885,13 +64562,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -63933,16 +64618,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -64012,12 +64692,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -64189,13 +64871,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -64241,6 +64923,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -64255,6 +64938,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -64279,13 +64963,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -64327,16 +65019,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -64406,12 +65093,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -64595,13 +65284,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -64647,6 +65336,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -64661,6 +65351,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -64685,13 +65376,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -64733,16 +65432,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -64812,12 +65506,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -64979,13 +65675,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -65031,6 +65727,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -65045,6 +65742,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -65069,13 +65767,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -65117,16 +65823,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -65196,12 +65897,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -65398,13 +66101,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -65450,6 +66153,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -65464,6 +66168,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -65488,13 +66193,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -65536,16 +66249,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -65615,12 +66323,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -65797,13 +66507,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -65849,6 +66559,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -65863,6 +66574,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -65887,13 +66599,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -65935,16 +66655,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -66014,12 +66729,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -66198,13 +66915,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -66250,6 +66967,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -66264,6 +66982,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -66288,13 +67007,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -66336,16 +67063,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -66415,12 +67137,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -66608,13 +67332,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -66660,6 +67384,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -66674,6 +67399,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -66698,13 +67424,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -66746,16 +67480,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -66825,12 +67554,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -67035,13 +67766,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -67087,6 +67818,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -67101,6 +67833,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -67125,13 +67858,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -67173,16 +67914,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -67252,12 +67988,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -67445,13 +68183,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -67497,6 +68235,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -67511,6 +68250,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -67535,13 +68275,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -67583,16 +68331,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -67662,12 +68405,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -67872,13 +68617,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -67924,6 +68669,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -67938,6 +68684,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -67962,13 +68709,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -68010,16 +68765,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -68089,12 +68839,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -68315,13 +69067,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -68367,6 +69119,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -68381,6 +69134,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -68405,13 +69159,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -68453,16 +69215,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -68532,12 +69289,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -68755,13 +69514,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -68807,6 +69566,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -68821,6 +69581,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -68845,13 +69606,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -68893,16 +69662,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -68972,12 +69736,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -69056,6 +69822,10 @@ components: description: K8S cluster URL endpoint type: string x-go-name: ClusterEndpoint + k8s-cluster-name: + description: K8S cluster name + type: string + x-go-name: ClusterName k8s-cluster-token: description: K8S cluster Bearer token type: string @@ -69207,13 +69977,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -69259,6 +70029,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -69273,6 +70044,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -69297,13 +70069,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -69345,16 +70125,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -69424,12 +70199,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -69639,13 +70416,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -69691,6 +70468,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -69705,6 +70483,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -69729,13 +70508,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -69777,16 +70564,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -69856,12 +70638,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -70107,13 +70891,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -70159,6 +70943,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -70173,6 +70958,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -70197,13 +70983,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -70245,16 +71039,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -70324,12 +71113,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -70539,13 +71330,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -70591,6 +71382,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -70605,6 +71397,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -70629,13 +71422,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -70677,16 +71478,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -70756,12 +71552,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -70967,13 +71765,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -71019,6 +71817,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -71033,6 +71832,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -71057,13 +71857,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -71105,16 +71913,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -71184,12 +71987,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -71404,13 +72209,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -71456,6 +72261,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -71470,6 +72276,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -71494,13 +72301,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -71542,16 +72357,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -71621,12 +72431,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -71811,13 +72623,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -71863,6 +72675,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -71877,6 +72690,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -71901,13 +72715,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -71949,16 +72771,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -72028,12 +72845,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -72226,13 +73045,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -72278,6 +73097,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -72292,6 +73112,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -72316,13 +73137,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -72364,16 +73193,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -72443,12 +73267,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -72627,13 +73453,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -72679,6 +73505,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -72693,6 +73520,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -72717,13 +73545,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -72765,16 +73601,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -72844,12 +73675,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -73074,13 +73907,13 @@ components: target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 - assoc_id: assoc_id target_name: target_name target_type: target_type attributes: key: attributes - target_id: 6 + target_id: 5 chef_server_username: chef_server_username k8s_client_cert_data: k8s_client_cert_data tags: @@ -73126,6 +73959,7 @@ components: azure_client_id: azure_client_id mongodb_default_auth_db: mongodb_default_auth_db mongodb_atlas_project_id: mongodb_atlas_project_id + google_workspace_access_mode: google_workspace_access_mode payload: payload redshift_creation_statements: redshift_creation_statements enforce_replay_prevention: true @@ -73140,6 +73974,7 @@ components: user_principal_name: user_principal_name k8s_client_key_data: k8s_client_key_data azure_subscription_id: azure_subscription_id + google_workspace_admin_name: google_workspace_admin_name gcp_service_account_key_id: gcp_service_account_key_id gcp_key_algo: gcp_key_algo venafi_zone: venafi_zone @@ -73164,13 +73999,21 @@ components: rabbitmq_server_uri: rabbitmq_server_uri chef_server_access_mode: chef_server_access_mode rabbitmq_user_conf_permission: rabbitmq_user_conf_permission + google_workspace_role_name: google_workspace_role_name is_fixed_user: is_fixed_user venafi_tpp_refresh_token: venafi_tpp_refresh_token + k8s_cluster_name: k8s_cluster_name sf_account: sf_account secure_remote_access_details: schema: schema host_provider_type: host_provider_type web_proxy: true + status_info: + is_in_use: true + last_used_item: 2000-01-23T04:56:07.000+00:00 + count_info: + key: + key: 3 bastion_ssh: bastion_ssh isolated: true target_hosts: @@ -73212,16 +74055,11 @@ components: region: region ssh_password: true bastion_issuer_id: 6 - status: - bastion_instance_id: bastion_instance_id - is_in_used: true - session_id: session_id - bastion_access_id: bastion_access_id - time: 2000-01-23T04:56:07.000+00:00 - bastion_cluster_name: bastion_cluster_name ldap_group_dn: ldap_group_dn + google_workspace_group_role: google_workspace_group_role chef_server_host_name: chef_server_host_name k8s_role_type: k8s_role_type + google_workspace_group_name: google_workspace_group_name mongodb_is_atlas: true eks_cluster_ca_certificate: eks_cluster_ca_certificate rotate_sync_url: rotate_sync_url @@ -73291,12 +74129,14 @@ components: revoke_sync_url: revoke_sync_url host_port: host_port enable_admin_rotation: true + google_workspace_role_scope: google_workspace_role_scope client_authentication_type: client_authentication_type db_tenant_id: db_tenant_id mongodb_uri_connection: mongodb_uri_connection db_user_name: db_user_name eks_region: eks_region artifactory_admin_apikey: artifactory_admin_apikey + cluster_mode: true azure_app_object_id: azure_app_object_id ldap_bind_password: ldap_bind_password subject_dn: subject_dn @@ -73741,7 +74581,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -73755,7 +74595,7 @@ components: protection_key_name: protection_key_name creation_date: 2000-01-23T04:56:07.000+00:00 access_date_display: access_date_display - version: 5 + version: 6 certificate_version_info: not_after: 2000-01-23T04:56:07.000+00:00 not_before: 2000-01-23T04:56:07.000+00:00 @@ -73878,8 +74718,7 @@ components: ttl: description: Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) - format: int64 - type: integer + type: string x-go-name: Ttl uid-token: description: The universal identity token, Required only for universal_identity @@ -82946,6 +83785,10 @@ components: Azure) type: string x-go-name: CloudServiceProvider + cluster-mode: + description: Cluster Mode + type: boolean + x-go-name: ClusterMode comment: description: Deprecated - use description type: string @@ -84478,6 +85321,10 @@ components: description: K8S cluster URL endpoint type: string x-go-name: ClusterEndpoint + k8s-cluster-name: + description: K8S cluster name + type: string + x-go-name: ClusterName k8s-cluster-token: default: dummy_val description: K8S cluster Bearer token @@ -86468,23 +87315,6 @@ components: x-go-name: Token type: object x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands - validateTokenOutput: - example: - reason: reason - is_valid: true - expiration: expiration - properties: - expiration: - type: string - x-go-name: ExpirationTime - is_valid: - type: boolean - x-go-name: IsValid - reason: - type: string - x-go-name: Reason - type: object - x-go-package: akeyless.io/akeyless-main-repo/go/src/client/commands verifyDataWithClassicKey: properties: data: diff --git a/build.gradle b/build.gradle index 51cedb63..2e4c869d 100644 --- a/build.gradle +++ b/build.gradle @@ -4,7 +4,7 @@ apply plugin: 'java' apply plugin: 'com.diffplug.spotless' group = 'io.akeyless' -version = '3.6.3' +version = '4.0.0' buildscript { repositories { diff --git a/build.sbt b/build.sbt index a48fdcff..a0a802ff 100644 --- a/build.sbt +++ b/build.sbt @@ -2,7 +2,7 @@ lazy val root = (project in file(".")). settings( organization := "io.akeyless", name := "akeyless-java", - version := "3.6.3", + version := "4.0.0", scalaVersion := "2.11.4", scalacOptions ++= Seq("-feature"), javacOptions in compile ++= Seq("-Xlint:deprecation"), diff --git a/docs/CreateDBTarget.md b/docs/CreateDBTarget.md index a587074c..e75589f1 100644 --- a/docs/CreateDBTarget.md +++ b/docs/CreateDBTarget.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **azureClientSecret** | **String** | (Optional) Client secret (relevant for \"cloud-service-provider\" only) | [optional] **azureTenantId** | **String** | (Optional) Tenant id (relevant for \"cloud-service-provider\" only) | [optional] **cloudServiceProvider** | **String** | (Optional) Cloud service provider (currently only supports Azure) | [optional] +**clusterMode** | **Boolean** | Cluster Mode | [optional] **comment** | **String** | Deprecated - use description | [optional] **connectionType** | **String** | (Optional) Type of connection to mssql database [credentials/cloud-identity] | **dbName** | **String** | | [optional] diff --git a/docs/CreateNativeK8STarget.md b/docs/CreateNativeK8STarget.md index e26bd973..6169a3a5 100644 --- a/docs/CreateNativeK8STarget.md +++ b/docs/CreateNativeK8STarget.md @@ -15,6 +15,7 @@ Name | Type | Description | Notes **k8sClientKey** | **String** | Content of the k8 client private key (PEM format) in a Base64 format | [optional] **k8sClusterCaCert** | **String** | K8S cluster CA certificate | **k8sClusterEndpoint** | **String** | K8S cluster URL endpoint | +**k8sClusterName** | **String** | K8S cluster name | [optional] **k8sClusterToken** | **String** | K8S cluster Bearer token | **key** | **String** | The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used) | [optional] **maxVersions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] diff --git a/docs/CreatePKICertIssuer.md b/docs/CreatePKICertIssuer.md index 7f99716e..9246a62c 100644 --- a/docs/CreatePKICertIssuer.md +++ b/docs/CreatePKICertIssuer.md @@ -42,7 +42,7 @@ Name | Type | Description | Notes **streetAddress** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] **tag** | **List<String>** | List of the tags attached to this key | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] -**ttl** | **Long** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | +**ttl** | **String** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/DSProducerDetails.md b/docs/DSProducerDetails.md index 6e34479d..632c6740 100644 --- a/docs/DSProducerDetails.md +++ b/docs/DSProducerDetails.md @@ -55,6 +55,7 @@ Name | Type | Description | Notes **chefSkipSsl** | **Boolean** | | [optional] **clientAuthenticationType** | **String** | | [optional] **cloudServiceProvider** | **String** | | [optional] +**clusterMode** | **Boolean** | | [optional] **connectionType** | **String** | | [optional] **createSyncUrl** | **String** | | [optional] **dbClientId** | **String** | | [optional] @@ -114,6 +115,12 @@ Name | Type | Description | Notes **gkeClusterName** | **String** | | [optional] **gkeServiceAccountKey** | **String** | | [optional] **gkeServiceAccountName** | **String** | | [optional] +**googleWorkspaceAccessMode** | **String** | | [optional] +**googleWorkspaceAdminName** | **String** | | [optional] +**googleWorkspaceGroupName** | **String** | | [optional] +**googleWorkspaceGroupRole** | **String** | | [optional] +**googleWorkspaceRoleName** | **String** | | [optional] +**googleWorkspaceRoleScope** | **String** | | [optional] **grantTypes** | **List<String>** | | [optional] **groups** | **String** | | [optional] **hanadbCreationStatements** | **String** | | [optional] @@ -133,6 +140,7 @@ Name | Type | Description | Notes **k8sClientKeyData** | **String** | | [optional] **k8sClusterCaCertificate** | **String** | | [optional] **k8sClusterEndpoint** | **String** | | [optional] +**k8sClusterName** | **String** | | [optional] **k8sDynamicMode** | **Boolean** | when native k8s is in dynamic mode, user can define allowed namespaces, K8sServiceAccount doesn't exist from the start and will only be created at time of getting dynamic secret value By default dynamic mode is false and producer behaves like it did before | [optional] **k8sMultipleDocYamlTempDefinition** | **List<Integer>** | Yaml definition for creation of temporary objects. Field that can hold multiple docs from which following will be extracted: ServiceAccount, Role/ClusterRole and RoleBinding/ClusterRoleBinding. If ServiceAccount not specified - it will be generated automatically | [optional] **k8sNamespace** | **String** | | [optional] diff --git a/docs/DbTargetDetails.md b/docs/DbTargetDetails.md index eaa8081f..09802ba2 100644 --- a/docs/DbTargetDetails.md +++ b/docs/DbTargetDetails.md @@ -9,6 +9,7 @@ DbTargetDetails Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cloudServiceProvider** | **String** | | [optional] +**clusterMode** | **Boolean** | | [optional] **connectionType** | **String** | | [optional] **dbClientId** | **String** | | [optional] **dbClientSecret** | **String** | | [optional] diff --git a/docs/DynamicSecretCreateGoogleWorkspace.md b/docs/DynamicSecretCreateGoogleWorkspace.md new file mode 100644 index 00000000..3547af58 --- /dev/null +++ b/docs/DynamicSecretCreateGoogleWorkspace.md @@ -0,0 +1,30 @@ + + +# DynamicSecretCreateGoogleWorkspace + +dynamicSecretCreateGoogleWorkspace is a command that creates Google Workspace dynamic secret + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**accessMode** | **String** | | +**adminName** | **String** | Admin user email | +**deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] +**description** | **String** | Description of the object | [optional] +**gcpKey** | **String** | Base64-encoded service account private key text | [optional] +**groupName** | **String** | A group email, relevant only for group access-mode | [optional] +**groupRoleType** | **String** | | [optional] +**json** | **Boolean** | Set output format to JSON | [optional] +**name** | **String** | Dynamic secret name | +**producerEncryptionKeyName** | **String** | Dynamic producer encryption key | [optional] +**roleName** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] +**roleScope** | **String** | | [optional] +**tags** | **List<String>** | Add tags attached to this object | [optional] +**targetName** | **String** | Name of existing target to use in producer creation | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**userTtl** | **String** | User TTL | [optional] + + + diff --git a/docs/DynamicSecretCreateK8s.md b/docs/DynamicSecretCreateK8s.md index b073534e..0d95c856 100644 --- a/docs/DynamicSecretCreateK8s.md +++ b/docs/DynamicSecretCreateK8s.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **k8sAllowedNamespaces** | **String** | Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic) | [optional] **k8sClusterCaCert** | **String** | K8S cluster CA certificate | [optional] **k8sClusterEndpoint** | **String** | K8S cluster URL endpoint | [optional] +**k8sClusterName** | **String** | K8S cluster name | [optional] **k8sClusterToken** | **String** | K8S cluster Bearer token | [optional] **k8sNamespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] **k8sPredefinedRoleName** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] diff --git a/docs/DynamicSecretGet.md b/docs/DynamicSecretGet.md index a37e8e6a..8c817fac 100644 --- a/docs/DynamicSecretGet.md +++ b/docs/DynamicSecretGet.md @@ -2,7 +2,7 @@ # DynamicSecretGet -DynamicSecretGet is a command that returns dynamic secret details +dynamicSecretGet is a command that returns dynamic secret details ## Properties diff --git a/docs/DynamicSecretUpdateGoogleWorkspace.md b/docs/DynamicSecretUpdateGoogleWorkspace.md new file mode 100644 index 00000000..390df909 --- /dev/null +++ b/docs/DynamicSecretUpdateGoogleWorkspace.md @@ -0,0 +1,31 @@ + + +# DynamicSecretUpdateGoogleWorkspace + +dynamicSecretUpdateGoogleWorkspace is a command that updates a Google Workspace dynamic secret + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**accessMode** | **String** | | +**adminName** | **String** | Admin user email | +**deleteProtection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] +**description** | **String** | Description of the object | [optional] +**gcpKey** | **String** | Base64-encoded service account private key text | [optional] +**groupName** | **String** | A group email, relevant only for group access-mode | [optional] +**groupRoleType** | **String** | | [optional] +**json** | **Boolean** | Set output format to JSON | [optional] +**name** | **String** | Dynamic secret name | +**newName** | **String** | Dynamic secret new name | [optional] +**producerEncryptionKeyName** | **String** | Dynamic producer encryption key | [optional] +**roleName** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] +**roleScope** | **String** | | [optional] +**tags** | **List<String>** | Add tags attached to this object | [optional] +**targetName** | **String** | Name of existing target to use in producer creation | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**userTtl** | **String** | User TTL | [optional] + + + diff --git a/docs/DynamicSecretUpdateK8s.md b/docs/DynamicSecretUpdateK8s.md index 230a3c8c..94a9e766 100644 --- a/docs/DynamicSecretUpdateK8s.md +++ b/docs/DynamicSecretUpdateK8s.md @@ -14,6 +14,7 @@ Name | Type | Description | Notes **k8sAllowedNamespaces** | **String** | Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic) | [optional] **k8sClusterCaCert** | **String** | K8S cluster CA certificate | [optional] **k8sClusterEndpoint** | **String** | K8S cluster URL endpoint | [optional] +**k8sClusterName** | **String** | K8S cluster name | [optional] **k8sClusterToken** | **String** | K8S cluster Bearer token | [optional] **k8sNamespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] **k8sPredefinedRoleName** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] diff --git a/docs/GatewayCreateProducerGoogleWorkspaceOutput.md b/docs/GatewayCreateProducerGoogleWorkspaceOutput.md new file mode 100644 index 00000000..c682aed3 --- /dev/null +++ b/docs/GatewayCreateProducerGoogleWorkspaceOutput.md @@ -0,0 +1,13 @@ + + +# GatewayCreateProducerGoogleWorkspaceOutput + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**producerDetails** | [**DSProducerDetails**](DSProducerDetails.md) | | [optional] + + + diff --git a/docs/GatewayCreateProducerNativeK8S.md b/docs/GatewayCreateProducerNativeK8S.md index 1c3d062d..89320e73 100644 --- a/docs/GatewayCreateProducerNativeK8S.md +++ b/docs/GatewayCreateProducerNativeK8S.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **k8sAllowedNamespaces** | **String** | Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic) | [optional] **k8sClusterCaCert** | **String** | K8S cluster CA certificate | [optional] **k8sClusterEndpoint** | **String** | K8S cluster URL endpoint | [optional] +**k8sClusterName** | **String** | K8S cluster name | [optional] **k8sClusterToken** | **String** | K8S cluster Bearer token | [optional] **k8sNamespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] **k8sPredefinedRoleName** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] diff --git a/docs/GatewayPartialUpdateK8SAuthConfig.md b/docs/GatewayPartialUpdateK8SAuthConfig.md new file mode 100644 index 00000000..7e71436f --- /dev/null +++ b/docs/GatewayPartialUpdateK8SAuthConfig.md @@ -0,0 +1,33 @@ + + +# GatewayPartialUpdateK8SAuthConfig + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**useDefaultIdentityBool** | **Boolean** | | [optional] +**accessId** | **String** | The access ID of the Kubernetes auth method | [optional] +**configEncryptionKeyName** | **String** | Config encryption key | [optional] +**disableIssuerValidation** | **String** | Disable issuer validation [true/false] | [optional] +**json** | **Boolean** | Set output format to JSON | [optional] +**k8sAuthType** | **String** | K8S auth type [token/certificate]. (relevant for \"native_k8s\" only) | [optional] +**k8sCaCert** | **String** | The CA Certificate (base64 encoded) to use to call into the kubernetes API server | [optional] +**k8sClientCertificate** | **String** | Content of the k8 client certificate (PEM format) in a Base64 format (relevant for \"native_k8s\" only) | [optional] +**k8sClientKey** | **String** | Content of the k8 client private key (PEM format) in a Base64 format (relevant for \"native_k8s\" only) | [optional] +**k8sHost** | **String** | The URL of the kubernetes API server | [optional] +**k8sIssuer** | **String** | The Kubernetes JWT issuer name. K8SIssuer is the claim that specifies who issued the Kubernetes token | [optional] +**name** | **String** | K8S Auth config name | [optional] +**newName** | **String** | K8S Auth config new name | [optional] +**rancherApiKey** | **String** | The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only) | [optional] +**rancherClusterId** | **String** | The cluster id as define in rancher (relevant for \"rancher\" only) | [optional] +**signingKey** | **String** | The private key (base64 encoded) associated with the public key defined in the Kubernetes auth | [optional] +**token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] +**tokenExp** | **Long** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional] +**tokenReviewerJwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] +**uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] +**useGwServiceAccount** | **String** | Use the GW's service account | [optional] + + + diff --git a/docs/GatewayPartialUpdateK8SAuthConfigOutput.md b/docs/GatewayPartialUpdateK8SAuthConfigOutput.md new file mode 100644 index 00000000..eb744707 --- /dev/null +++ b/docs/GatewayPartialUpdateK8SAuthConfigOutput.md @@ -0,0 +1,15 @@ + + +# GatewayPartialUpdateK8SAuthConfigOutput + + +## Properties + +Name | Type | Description | Notes +------------ | ------------- | ------------- | ------------- +**clusterId** | **String** | | [optional] +**partsChange** | [**ConfigChange**](ConfigChange.md) | | [optional] +**totalHash** | **String** | | [optional] + + + diff --git a/docs/GatewayUpdateProducerNativeK8S.md b/docs/GatewayUpdateProducerNativeK8S.md index 2ae4e875..0453b2d8 100644 --- a/docs/GatewayUpdateProducerNativeK8S.md +++ b/docs/GatewayUpdateProducerNativeK8S.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **k8sAllowedNamespaces** | **String** | Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic) | [optional] **k8sClusterCaCert** | **String** | K8S cluster CA certificate | [optional] **k8sClusterEndpoint** | **String** | K8S cluster URL endpoint | [optional] +**k8sClusterName** | **String** | K8S cluster name | [optional] **k8sClusterToken** | **String** | K8S cluster Bearer token | [optional] **k8sNamespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] **k8sPredefinedRoleName** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] diff --git a/docs/GetKubeExecCreds.md b/docs/GetKubeExecCreds.md index 1bef1cfa..bc7ace7b 100644 --- a/docs/GetKubeExecCreds.md +++ b/docs/GetKubeExecCreds.md @@ -18,7 +18,7 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keyDataBase64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] -**ttl** | **Long** | Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) | [optional] +**ttl** | **String** | Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] **uriSans** | **String** | The URI Subject Alternative Names to be included in the PKI certificate (in a comma-separated list) (if CSR is supplied this flag is ignored and any URI.* names are taken from it) | [optional] diff --git a/docs/GetPKICertificate.md b/docs/GetPKICertificate.md index 81ecd6f8..53980e58 100644 --- a/docs/GetPKICertificate.md +++ b/docs/GetPKICertificate.md @@ -16,7 +16,7 @@ Name | Type | Description | Notes **json** | **Boolean** | Set output format to JSON | [optional] **keyDataBase64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] -**ttl** | **Long** | Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) | [optional] +**ttl** | **String** | Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) | [optional] **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] **uriSans** | **String** | The URI Subject Alternative Names to be included in the PKI certificate (in a comma-separated list) (if CSR is supplied this flag is ignored and any URI.* names are taken from it) | [optional] diff --git a/docs/ItemSraStatus.md b/docs/ItemSraStatus.md index d39aa54d..8ead6b68 100644 --- a/docs/ItemSraStatus.md +++ b/docs/ItemSraStatus.md @@ -7,12 +7,9 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**bastionAccessId** | **String** | | [optional] -**bastionClusterName** | **String** | | [optional] -**bastionInstanceId** | **String** | | [optional] -**isInUsed** | **Boolean** | | [optional] -**sessionId** | **String** | | [optional] -**time** | **OffsetDateTime** | | [optional] +**countInfo** | **Map<String, Map<String, Long>>** | | [optional] +**isInUse** | **Boolean** | | [optional] +**lastUsedItem** | **OffsetDateTime** | | [optional] diff --git a/docs/NativeK8sTargetDetails.md b/docs/NativeK8sTargetDetails.md index 1ead580f..f36a17fa 100644 --- a/docs/NativeK8sTargetDetails.md +++ b/docs/NativeK8sTargetDetails.md @@ -13,6 +13,7 @@ Name | Type | Description | Notes **k8sClientKeyData** | **String** | | [optional] **k8sClusterCaCertificate** | **String** | | [optional] **k8sClusterEndpoint** | **String** | | [optional] +**k8sClusterName** | **String** | | [optional] **useGwServiceAccount** | **Boolean** | | [optional] diff --git a/docs/SecureRemoteAccess.md b/docs/SecureRemoteAccess.md index 7bd53643..04f3d70e 100644 --- a/docs/SecureRemoteAccess.md +++ b/docs/SecureRemoteAccess.md @@ -34,7 +34,7 @@ Name | Type | Description | Notes **sshPassword** | **Boolean** | | [optional] **sshPrivateKey** | **Boolean** | | [optional] **sshUser** | **String** | | [optional] -**status** | [**ItemSraStatus**](ItemSraStatus.md) | | [optional] +**statusInfo** | [**ItemSraStatus**](ItemSraStatus.md) | | [optional] **targetHosts** | [**List<TargetNameWithHosts>**](TargetNameWithHosts.md) | | [optional] **targets** | **List<String>** | | [optional] **url** | **String** | | [optional] diff --git a/docs/UpdateDBTarget.md b/docs/UpdateDBTarget.md index 51ddf270..8277c02e 100644 --- a/docs/UpdateDBTarget.md +++ b/docs/UpdateDBTarget.md @@ -12,6 +12,7 @@ Name | Type | Description | Notes **azureClientSecret** | **String** | (Optional) Client secret (relevant for \"cloud-service-provider\" only) | [optional] **azureTenantId** | **String** | (Optional) Tenant id (relevant for \"cloud-service-provider\" only) | [optional] **cloudServiceProvider** | **String** | (Optional) Cloud service provider (currently only supports Azure) | [optional] +**clusterMode** | **Boolean** | Cluster Mode | [optional] **comment** | **String** | Deprecated - use description | [optional] **connectionType** | **String** | (Optional) Type of connection to mssql database [credentials/cloud-identity] | **dbName** | **String** | | [optional] diff --git a/docs/UpdateNativeK8STarget.md b/docs/UpdateNativeK8STarget.md index 38900416..442b3ffc 100644 --- a/docs/UpdateNativeK8STarget.md +++ b/docs/UpdateNativeK8STarget.md @@ -15,6 +15,7 @@ Name | Type | Description | Notes **k8sClientKey** | **String** | Content of the k8 client private key (PEM format) in a Base64 format | [optional] **k8sClusterCaCert** | **String** | K8S cluster CA certificate | **k8sClusterEndpoint** | **String** | K8S cluster URL endpoint | +**k8sClusterName** | **String** | K8S cluster name | [optional] **k8sClusterToken** | **String** | K8S cluster Bearer token | **keepPrevVersion** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] **key** | **String** | The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used) | [optional] diff --git a/docs/UpdatePKICertIssuer.md b/docs/UpdatePKICertIssuer.md index e55baa7a..6d15bb27 100644 --- a/docs/UpdatePKICertIssuer.md +++ b/docs/UpdatePKICertIssuer.md @@ -43,7 +43,7 @@ Name | Type | Description | Notes **signerKeyName** | **String** | A key to sign the certificate with, required in Private CA mode | **streetAddress** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] -**ttl** | **Long** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | +**ttl** | **String** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | **uidToken** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] diff --git a/docs/V2Api.md b/docs/V2Api.md index 2c6ebbb4..eadc1793 100644 --- a/docs/V2Api.md +++ b/docs/V2Api.md @@ -97,6 +97,7 @@ Method | HTTP request | Description [**dynamicSecretCreateGcp**](V2Api.md#dynamicSecretCreateGcp) | **POST** /dynamic-secret-create-gcp | [**dynamicSecretCreateGithub**](V2Api.md#dynamicSecretCreateGithub) | **POST** /dynamic-secret-create-github | [**dynamicSecretCreateGke**](V2Api.md#dynamicSecretCreateGke) | **POST** /dynamic-secret-create-gke | +[**dynamicSecretCreateGoogleWorkspace**](V2Api.md#dynamicSecretCreateGoogleWorkspace) | **POST** /dynamic-secret-create-google-workspace | [**dynamicSecretCreateHanaDb**](V2Api.md#dynamicSecretCreateHanaDb) | **POST** /dynamic-secret-create-hanadb | [**dynamicSecretCreateK8s**](V2Api.md#dynamicSecretCreateK8s) | **POST** /dynamic-secret-create-k8s | [**dynamicSecretCreateLdap**](V2Api.md#dynamicSecretCreateLdap) | **POST** /dynamic-secret-create-ldap | @@ -129,6 +130,7 @@ Method | HTTP request | Description [**dynamicSecretUpdateGcp**](V2Api.md#dynamicSecretUpdateGcp) | **POST** /dynamic-secret-update-gcp | [**dynamicSecretUpdateGithub**](V2Api.md#dynamicSecretUpdateGithub) | **POST** /dynamic-secret-update-github | [**dynamicSecretUpdateGke**](V2Api.md#dynamicSecretUpdateGke) | **POST** /dynamic-secret-update-gke | +[**dynamicSecretUpdateGoogleWorkspace**](V2Api.md#dynamicSecretUpdateGoogleWorkspace) | **POST** /dynamic-secret-update-google-workspace | [**dynamicSecretUpdateHanaDb**](V2Api.md#dynamicSecretUpdateHanaDb) | **POST** /dynamic-secret-update-hana | [**dynamicSecretUpdateK8s**](V2Api.md#dynamicSecretUpdateK8s) | **POST** /dynamic-secret-update-k8s | [**dynamicSecretUpdateLdap**](V2Api.md#dynamicSecretUpdateLdap) | **POST** /dynamic-secret-update-ldap | @@ -6106,6 +6108,67 @@ No authorization required **201** | dynamicSecretCreateGkeResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **dynamicSecretCreateGoogleWorkspace** +> DynamicSecretCreateOutput dynamicSecretCreateGoogleWorkspace(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + DynamicSecretCreateGoogleWorkspace body = new DynamicSecretCreateGoogleWorkspace(); // DynamicSecretCreateGoogleWorkspace | + try { + DynamicSecretCreateOutput result = apiInstance.dynamicSecretCreateGoogleWorkspace(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#dynamicSecretCreateGoogleWorkspace"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**DynamicSecretCreateGoogleWorkspace**](DynamicSecretCreateGoogleWorkspace.md)| | + +### Return type + +[**DynamicSecretCreateOutput**](DynamicSecretCreateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**201** | dynamicSecretCreateGoogleWorkspaceResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **dynamicSecretCreateHanaDb** > DynamicSecretCreateOutput dynamicSecretCreateHanaDb(body) @@ -7084,7 +7147,7 @@ No authorization required # **dynamicSecretGet** -> DSProducerDetails dynamicSecretGet() +> DSProducerDetails dynamicSecretGet(body) @@ -7103,8 +7166,9 @@ public class Example { defaultClient.setBasePath("https://api.akeyless.io"); V2Api apiInstance = new V2Api(defaultClient); + DynamicSecretGet body = new DynamicSecretGet(); // DynamicSecretGet | try { - DSProducerDetails result = apiInstance.dynamicSecretGet(); + DSProducerDetails result = apiInstance.dynamicSecretGet(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling V2Api#dynamicSecretGet"); @@ -7118,7 +7182,10 @@ public class Example { ``` ### Parameters -This endpoint does not need any parameter. + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**DynamicSecretGet**](DynamicSecretGet.md)| | ### Return type @@ -7130,7 +7197,7 @@ No authorization required ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json ### HTTP response details @@ -8052,6 +8119,67 @@ No authorization required **201** | dynamicSecretUpdateGkeResponse wraps response body. | - | **0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + +# **dynamicSecretUpdateGoogleWorkspace** +> DynamicSecretUpdateOutput dynamicSecretUpdateGoogleWorkspace(body) + + + +### Example +```java +// Import classes: +import io.akeyless.client.ApiClient; +import io.akeyless.client.ApiException; +import io.akeyless.client.Configuration; +import io.akeyless.client.models.*; +import io.akeyless.client.api.V2Api; + +public class Example { + public static void main(String[] args) { + ApiClient defaultClient = Configuration.getDefaultApiClient(); + defaultClient.setBasePath("https://api.akeyless.io"); + + V2Api apiInstance = new V2Api(defaultClient); + DynamicSecretUpdateGoogleWorkspace body = new DynamicSecretUpdateGoogleWorkspace(); // DynamicSecretUpdateGoogleWorkspace | + try { + DynamicSecretUpdateOutput result = apiInstance.dynamicSecretUpdateGoogleWorkspace(body); + System.out.println(result); + } catch (ApiException e) { + System.err.println("Exception when calling V2Api#dynamicSecretUpdateGoogleWorkspace"); + System.err.println("Status code: " + e.getCode()); + System.err.println("Reason: " + e.getResponseBody()); + System.err.println("Response headers: " + e.getResponseHeaders()); + e.printStackTrace(); + } + } +} +``` + +### Parameters + +Name | Type | Description | Notes +------------- | ------------- | ------------- | ------------- + **body** | [**DynamicSecretUpdateGoogleWorkspace**](DynamicSecretUpdateGoogleWorkspace.md)| | + +### Return type + +[**DynamicSecretUpdateOutput**](DynamicSecretUpdateOutput.md) + +### Authorization + +No authorization required + +### HTTP request headers + + - **Content-Type**: application/json + - **Accept**: application/json + +### HTTP response details +| Status code | Description | Response headers | +|-------------|-------------|------------------| +**201** | dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. | - | +**0** | errorResponse wraps any error to return it as a JSON object with one \"error\" field. | - | + # **dynamicSecretUpdateHanaDb** > DynamicSecretUpdateOutput dynamicSecretUpdateHanaDb(body) @@ -15612,7 +15740,7 @@ No authorization required # **getDynamicSecretValue** -> Map<String, String> getDynamicSecretValue(body) +> Map<String, Object> getDynamicSecretValue(body) @@ -15633,7 +15761,7 @@ public class Example { V2Api apiInstance = new V2Api(defaultClient); GetDynamicSecretValue body = new GetDynamicSecretValue(); // GetDynamicSecretValue | try { - Map result = apiInstance.getDynamicSecretValue(body); + Map result = apiInstance.getDynamicSecretValue(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling V2Api#getDynamicSecretValue"); @@ -15654,7 +15782,7 @@ Name | Type | Description | Notes ### Return type -**Map<String, String>** +**Map<String, Object>** ### Authorization @@ -16222,7 +16350,7 @@ No authorization required # **getSecretValue** -> Map<String, String> getSecretValue(body) +> Map<String, Object> getSecretValue(body) @@ -16243,7 +16371,7 @@ public class Example { V2Api apiInstance = new V2Api(defaultClient); GetSecretValue body = new GetSecretValue(); // GetSecretValue | try { - Map result = apiInstance.getSecretValue(body); + Map result = apiInstance.getSecretValue(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling V2Api#getSecretValue"); @@ -16264,7 +16392,7 @@ Name | Type | Description | Notes ### Return type -**Map<String, String>** +**Map<String, Object>** ### Authorization @@ -19755,7 +19883,7 @@ No authorization required # **rotatedSecretGetValue** -> Map<String, String> rotatedSecretGetValue(body) +> Map<String, Object> rotatedSecretGetValue(body) @@ -19776,7 +19904,7 @@ public class Example { V2Api apiInstance = new V2Api(defaultClient); RotatedSecretGetValue body = new RotatedSecretGetValue(); // RotatedSecretGetValue | try { - Map result = apiInstance.rotatedSecretGetValue(body); + Map result = apiInstance.rotatedSecretGetValue(body); System.out.println(result); } catch (ApiException e) { System.err.println("Exception when calling V2Api#rotatedSecretGetValue"); @@ -19797,7 +19925,7 @@ Name | Type | Description | Notes ### Return type -**Map<String, String>** +**Map<String, Object>** ### Authorization diff --git a/docs/ValidateTokenOutput.md b/docs/ValidateTokenOutput.md index c1d776ee..ff129990 100644 --- a/docs/ValidateTokenOutput.md +++ b/docs/ValidateTokenOutput.md @@ -9,7 +9,9 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **expiration** | **String** | | [optional] **isValid** | **Boolean** | | [optional] +**lastRotate** | **String** | | [optional] **reason** | **String** | | [optional] +**ttl** | **Integer** | | [optional] diff --git a/pom.xml b/pom.xml index cf74cf70..60fa070c 100644 --- a/pom.xml +++ b/pom.xml @@ -5,7 +5,7 @@ akeyless-java jar akeyless-java - 3.6.3 + 4.0.0 https://github.com/akeylesslabs/akeyless-java Akeyless Java SDK diff --git a/src/main/java/io/akeyless/client/ApiClient.java b/src/main/java/io/akeyless/client/ApiClient.java index 641b70ad..06feca75 100644 --- a/src/main/java/io/akeyless/client/ApiClient.java +++ b/src/main/java/io/akeyless/client/ApiClient.java @@ -129,7 +129,7 @@ private void init() { json = new JSON(); // Set default User-Agent. - setUserAgent("OpenAPI-Generator/3.6.3/java"); + setUserAgent("OpenAPI-Generator/4.0.0/java"); authentications = new HashMap(); } diff --git a/src/main/java/io/akeyless/client/api/V2Api.java b/src/main/java/io/akeyless/client/api/V2Api.java index 2a167ba6..89625705 100644 --- a/src/main/java/io/akeyless/client/api/V2Api.java +++ b/src/main/java/io/akeyless/client/api/V2Api.java @@ -195,6 +195,7 @@ import io.akeyless.client.model.DynamicSecretCreateGcp; import io.akeyless.client.model.DynamicSecretCreateGithub; import io.akeyless.client.model.DynamicSecretCreateGke; +import io.akeyless.client.model.DynamicSecretCreateGoogleWorkspace; import io.akeyless.client.model.DynamicSecretCreateHanaDb; import io.akeyless.client.model.DynamicSecretCreateK8s; import io.akeyless.client.model.DynamicSecretCreateLdap; @@ -213,6 +214,7 @@ import io.akeyless.client.model.DynamicSecretCreateVenafi; import io.akeyless.client.model.DynamicSecretDelete; import io.akeyless.client.model.DynamicSecretDeleteOutput; +import io.akeyless.client.model.DynamicSecretGet; import io.akeyless.client.model.DynamicSecretGetValue; import io.akeyless.client.model.DynamicSecretList; import io.akeyless.client.model.DynamicSecretTmpCredsDelete; @@ -228,6 +230,7 @@ import io.akeyless.client.model.DynamicSecretUpdateGcp; import io.akeyless.client.model.DynamicSecretUpdateGithub; import io.akeyless.client.model.DynamicSecretUpdateGke; +import io.akeyless.client.model.DynamicSecretUpdateGoogleWorkspace; import io.akeyless.client.model.DynamicSecretUpdateHanaDb; import io.akeyless.client.model.DynamicSecretUpdateK8s; import io.akeyless.client.model.DynamicSecretUpdateLdap; @@ -12943,6 +12946,137 @@ public okhttp3.Call dynamicSecretCreateGkeAsync(DynamicSecretCreateGke body, fin localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } + /** + * Build call for dynamicSecretCreateGoogleWorkspace + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretCreateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call dynamicSecretCreateGoogleWorkspaceCall(DynamicSecretCreateGoogleWorkspace body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/dynamic-secret-create-google-workspace"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call dynamicSecretCreateGoogleWorkspaceValidateBeforeCall(DynamicSecretCreateGoogleWorkspace body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling dynamicSecretCreateGoogleWorkspace(Async)"); + } + + + okhttp3.Call localVarCall = dynamicSecretCreateGoogleWorkspaceCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return DynamicSecretCreateOutput + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretCreateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public DynamicSecretCreateOutput dynamicSecretCreateGoogleWorkspace(DynamicSecretCreateGoogleWorkspace body) throws ApiException { + ApiResponse localVarResp = dynamicSecretCreateGoogleWorkspaceWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<DynamicSecretCreateOutput> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretCreateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse dynamicSecretCreateGoogleWorkspaceWithHttpInfo(DynamicSecretCreateGoogleWorkspace body) throws ApiException { + okhttp3.Call localVarCall = dynamicSecretCreateGoogleWorkspaceValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretCreateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call dynamicSecretCreateGoogleWorkspaceAsync(DynamicSecretCreateGoogleWorkspace body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = dynamicSecretCreateGoogleWorkspaceValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for dynamicSecretCreateHanaDb * @param body (required) @@ -15041,6 +15175,7 @@ public okhttp3.Call dynamicSecretDeleteAsync(DynamicSecretDelete body, final Api } /** * Build call for dynamicSecretGet + * @param body (required) * @param _callback Callback for upload/download progress * @return Call to execute * @throws ApiException If fail to serialize the request body object @@ -15051,7 +15186,7 @@ public okhttp3.Call dynamicSecretDeleteAsync(DynamicSecretDelete body, final Api 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call dynamicSecretGetCall(final ApiCallback _callback) throws ApiException { + public okhttp3.Call dynamicSecretGetCall(DynamicSecretGet body, final ApiCallback _callback) throws ApiException { String basePath = null; // Operation Servers @@ -15066,7 +15201,7 @@ public okhttp3.Call dynamicSecretGetCall(final ApiCallback _callback) throws Api basePath = null; } - Object localVarPostBody = null; + Object localVarPostBody = body; // create path and map variables String localVarPath = "/dynamic-secret-get"; @@ -15086,7 +15221,7 @@ public okhttp3.Call dynamicSecretGetCall(final ApiCallback _callback) throws Api } final String[] localVarContentTypes = { - + "application/json" }; final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); if (localVarContentType != null) { @@ -15098,10 +15233,15 @@ public okhttp3.Call dynamicSecretGetCall(final ApiCallback _callback) throws Api } @SuppressWarnings("rawtypes") - private okhttp3.Call dynamicSecretGetValidateBeforeCall(final ApiCallback _callback) throws ApiException { + private okhttp3.Call dynamicSecretGetValidateBeforeCall(DynamicSecretGet body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling dynamicSecretGet(Async)"); + } - okhttp3.Call localVarCall = dynamicSecretGetCall(_callback); + okhttp3.Call localVarCall = dynamicSecretGetCall(body, _callback); return localVarCall; } @@ -15109,6 +15249,7 @@ private okhttp3.Call dynamicSecretGetValidateBeforeCall(final ApiCallback _callb /** * * + * @param body (required) * @return DSProducerDetails * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -15118,14 +15259,15 @@ private okhttp3.Call dynamicSecretGetValidateBeforeCall(final ApiCallback _callb 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public DSProducerDetails dynamicSecretGet() throws ApiException { - ApiResponse localVarResp = dynamicSecretGetWithHttpInfo(); + public DSProducerDetails dynamicSecretGet(DynamicSecretGet body) throws ApiException { + ApiResponse localVarResp = dynamicSecretGetWithHttpInfo(body); return localVarResp.getData(); } /** * * + * @param body (required) * @return ApiResponse<DSProducerDetails> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -15135,8 +15277,8 @@ public DSProducerDetails dynamicSecretGet() throws ApiException { 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public ApiResponse dynamicSecretGetWithHttpInfo() throws ApiException { - okhttp3.Call localVarCall = dynamicSecretGetValidateBeforeCall(null); + public ApiResponse dynamicSecretGetWithHttpInfo(DynamicSecretGet body) throws ApiException { + okhttp3.Call localVarCall = dynamicSecretGetValidateBeforeCall(body, null); Type localVarReturnType = new TypeToken(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -15144,6 +15286,7 @@ public ApiResponse dynamicSecretGetWithHttpInfo() throws ApiE /** * (asynchronously) * + * @param body (required) * @param _callback The callback to be executed when the API call finishes * @return The request call * @throws ApiException If fail to process the API call, e.g. serializing the request body object @@ -15154,9 +15297,9 @@ public ApiResponse dynamicSecretGetWithHttpInfo() throws ApiE 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call dynamicSecretGetAsync(final ApiCallback _callback) throws ApiException { + public okhttp3.Call dynamicSecretGetAsync(DynamicSecretGet body, final ApiCallback _callback) throws ApiException { - okhttp3.Call localVarCall = dynamicSecretGetValidateBeforeCall(_callback); + okhttp3.Call localVarCall = dynamicSecretGetValidateBeforeCall(body, _callback); Type localVarReturnType = new TypeToken(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; @@ -17113,6 +17256,137 @@ public okhttp3.Call dynamicSecretUpdateGkeAsync(DynamicSecretUpdateGke body, fin localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } + /** + * Build call for dynamicSecretUpdateGoogleWorkspace + * @param body (required) + * @param _callback Callback for upload/download progress + * @return Call to execute + * @throws ApiException If fail to serialize the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call dynamicSecretUpdateGoogleWorkspaceCall(DynamicSecretUpdateGoogleWorkspace body, final ApiCallback _callback) throws ApiException { + String basePath = null; + + // Operation Servers + String[] localBasePaths = new String[] { }; + + // Determine Base Path to Use + if (localCustomBaseUrl != null){ + basePath = localCustomBaseUrl; + } else if ( localBasePaths.length > 0 ) { + basePath = localBasePaths[localHostIndex]; + } else { + basePath = null; + } + + Object localVarPostBody = body; + + // create path and map variables + String localVarPath = "/dynamic-secret-update-google-workspace"; + + List localVarQueryParams = new ArrayList(); + List localVarCollectionQueryParams = new ArrayList(); + Map localVarHeaderParams = new HashMap(); + Map localVarCookieParams = new HashMap(); + Map localVarFormParams = new HashMap(); + + final String[] localVarAccepts = { + "application/json" + }; + final String localVarAccept = localVarApiClient.selectHeaderAccept(localVarAccepts); + if (localVarAccept != null) { + localVarHeaderParams.put("Accept", localVarAccept); + } + + final String[] localVarContentTypes = { + "application/json" + }; + final String localVarContentType = localVarApiClient.selectHeaderContentType(localVarContentTypes); + if (localVarContentType != null) { + localVarHeaderParams.put("Content-Type", localVarContentType); + } + + String[] localVarAuthNames = new String[] { }; + return localVarApiClient.buildCall(basePath, localVarPath, "POST", localVarQueryParams, localVarCollectionQueryParams, localVarPostBody, localVarHeaderParams, localVarCookieParams, localVarFormParams, localVarAuthNames, _callback); + } + + @SuppressWarnings("rawtypes") + private okhttp3.Call dynamicSecretUpdateGoogleWorkspaceValidateBeforeCall(DynamicSecretUpdateGoogleWorkspace body, final ApiCallback _callback) throws ApiException { + + // verify the required parameter 'body' is set + if (body == null) { + throw new ApiException("Missing the required parameter 'body' when calling dynamicSecretUpdateGoogleWorkspace(Async)"); + } + + + okhttp3.Call localVarCall = dynamicSecretUpdateGoogleWorkspaceCall(body, _callback); + return localVarCall; + + } + + /** + * + * + * @param body (required) + * @return DynamicSecretUpdateOutput + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public DynamicSecretUpdateOutput dynamicSecretUpdateGoogleWorkspace(DynamicSecretUpdateGoogleWorkspace body) throws ApiException { + ApiResponse localVarResp = dynamicSecretUpdateGoogleWorkspaceWithHttpInfo(body); + return localVarResp.getData(); + } + + /** + * + * + * @param body (required) + * @return ApiResponse<DynamicSecretUpdateOutput> + * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public ApiResponse dynamicSecretUpdateGoogleWorkspaceWithHttpInfo(DynamicSecretUpdateGoogleWorkspace body) throws ApiException { + okhttp3.Call localVarCall = dynamicSecretUpdateGoogleWorkspaceValidateBeforeCall(body, null); + Type localVarReturnType = new TypeToken(){}.getType(); + return localVarApiClient.execute(localVarCall, localVarReturnType); + } + + /** + * (asynchronously) + * + * @param body (required) + * @param _callback The callback to be executed when the API call finishes + * @return The request call + * @throws ApiException If fail to process the API call, e.g. serializing the request body object + * @http.response.details + + + + +
Status Code Description Response Headers
201 dynamicSecretUpdateGoogleWorkspaceResponse wraps response body. -
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
+ */ + public okhttp3.Call dynamicSecretUpdateGoogleWorkspaceAsync(DynamicSecretUpdateGoogleWorkspace body, final ApiCallback _callback) throws ApiException { + + okhttp3.Call localVarCall = dynamicSecretUpdateGoogleWorkspaceValidateBeforeCall(body, _callback); + Type localVarReturnType = new TypeToken(){}.getType(); + localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); + return localVarCall; + } /** * Build call for dynamicSecretUpdateHanaDb * @param body (required) @@ -33402,7 +33676,7 @@ private okhttp3.Call getDynamicSecretValueValidateBeforeCall(GetDynamicSecretVal * * * @param body (required) - * @return Map<String, String> + * @return Map<String, Object> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -33411,8 +33685,8 @@ private okhttp3.Call getDynamicSecretValueValidateBeforeCall(GetDynamicSecretVal
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
*/ - public Map getDynamicSecretValue(GetDynamicSecretValue body) throws ApiException { - ApiResponse> localVarResp = getDynamicSecretValueWithHttpInfo(body); + public Map getDynamicSecretValue(GetDynamicSecretValue body) throws ApiException { + ApiResponse> localVarResp = getDynamicSecretValueWithHttpInfo(body); return localVarResp.getData(); } @@ -33420,7 +33694,7 @@ public Map getDynamicSecretValue(GetDynamicSecretValue body) thr * * * @param body (required) - * @return ApiResponse<Map<String, String>> + * @return ApiResponse<Map<String, Object>> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -33429,9 +33703,9 @@ public Map getDynamicSecretValue(GetDynamicSecretValue body) thr
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
*/ - public ApiResponse> getDynamicSecretValueWithHttpInfo(GetDynamicSecretValue body) throws ApiException { + public ApiResponse> getDynamicSecretValueWithHttpInfo(GetDynamicSecretValue body) throws ApiException { okhttp3.Call localVarCall = getDynamicSecretValueValidateBeforeCall(body, null); - Type localVarReturnType = new TypeToken>(){}.getType(); + Type localVarReturnType = new TypeToken>(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -33449,10 +33723,10 @@ public ApiResponse> getDynamicSecretValueWithHttpInfo(GetDyn 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call getDynamicSecretValueAsync(GetDynamicSecretValue body, final ApiCallback> _callback) throws ApiException { + public okhttp3.Call getDynamicSecretValueAsync(GetDynamicSecretValue body, final ApiCallback> _callback) throws ApiException { okhttp3.Call localVarCall = getDynamicSecretValueValidateBeforeCall(body, _callback); - Type localVarReturnType = new TypeToken>(){}.getType(); + Type localVarReturnType = new TypeToken>(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } @@ -34712,7 +34986,7 @@ private okhttp3.Call getSecretValueValidateBeforeCall(GetSecretValue body, final * * * @param body (required) - * @return Map<String, String> + * @return Map<String, Object> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -34721,8 +34995,8 @@ private okhttp3.Call getSecretValueValidateBeforeCall(GetSecretValue body, final
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
*/ - public Map getSecretValue(GetSecretValue body) throws ApiException { - ApiResponse> localVarResp = getSecretValueWithHttpInfo(body); + public Map getSecretValue(GetSecretValue body) throws ApiException { + ApiResponse> localVarResp = getSecretValueWithHttpInfo(body); return localVarResp.getData(); } @@ -34730,7 +35004,7 @@ public Map getSecretValue(GetSecretValue body) throws ApiExcepti * * * @param body (required) - * @return ApiResponse<Map<String, String>> + * @return ApiResponse<Map<String, Object>> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -34739,9 +35013,9 @@ public Map getSecretValue(GetSecretValue body) throws ApiExcepti
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
*/ - public ApiResponse> getSecretValueWithHttpInfo(GetSecretValue body) throws ApiException { + public ApiResponse> getSecretValueWithHttpInfo(GetSecretValue body) throws ApiException { okhttp3.Call localVarCall = getSecretValueValidateBeforeCall(body, null); - Type localVarReturnType = new TypeToken>(){}.getType(); + Type localVarReturnType = new TypeToken>(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -34759,10 +35033,10 @@ public ApiResponse> getSecretValueWithHttpInfo(GetSecretValu 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call getSecretValueAsync(GetSecretValue body, final ApiCallback> _callback) throws ApiException { + public okhttp3.Call getSecretValueAsync(GetSecretValue body, final ApiCallback> _callback) throws ApiException { okhttp3.Call localVarCall = getSecretValueValidateBeforeCall(body, _callback); - Type localVarReturnType = new TypeToken>(){}.getType(); + Type localVarReturnType = new TypeToken>(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } @@ -42227,7 +42501,7 @@ private okhttp3.Call rotatedSecretGetValueValidateBeforeCall(RotatedSecretGetVal * * * @param body (required) - * @return Map<String, String> + * @return Map<String, Object> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -42236,8 +42510,8 @@ private okhttp3.Call rotatedSecretGetValueValidateBeforeCall(RotatedSecretGetVal
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
*/ - public Map rotatedSecretGetValue(RotatedSecretGetValue body) throws ApiException { - ApiResponse> localVarResp = rotatedSecretGetValueWithHttpInfo(body); + public Map rotatedSecretGetValue(RotatedSecretGetValue body) throws ApiException { + ApiResponse> localVarResp = rotatedSecretGetValueWithHttpInfo(body); return localVarResp.getData(); } @@ -42245,7 +42519,7 @@ public Map rotatedSecretGetValue(RotatedSecretGetValue body) thr * * * @param body (required) - * @return ApiResponse<Map<String, String>> + * @return ApiResponse<Map<String, Object>> * @throws ApiException If fail to call the API, e.g. server error or cannot deserialize the response body * @http.response.details @@ -42254,9 +42528,9 @@ public Map rotatedSecretGetValue(RotatedSecretGetValue body) thr
0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. -
*/ - public ApiResponse> rotatedSecretGetValueWithHttpInfo(RotatedSecretGetValue body) throws ApiException { + public ApiResponse> rotatedSecretGetValueWithHttpInfo(RotatedSecretGetValue body) throws ApiException { okhttp3.Call localVarCall = rotatedSecretGetValueValidateBeforeCall(body, null); - Type localVarReturnType = new TypeToken>(){}.getType(); + Type localVarReturnType = new TypeToken>(){}.getType(); return localVarApiClient.execute(localVarCall, localVarReturnType); } @@ -42274,10 +42548,10 @@ public ApiResponse> rotatedSecretGetValueWithHttpInfo(Rotate 0 errorResponse wraps any error to return it as a JSON object with one \"error\" field. - */ - public okhttp3.Call rotatedSecretGetValueAsync(RotatedSecretGetValue body, final ApiCallback> _callback) throws ApiException { + public okhttp3.Call rotatedSecretGetValueAsync(RotatedSecretGetValue body, final ApiCallback> _callback) throws ApiException { okhttp3.Call localVarCall = rotatedSecretGetValueValidateBeforeCall(body, _callback); - Type localVarReturnType = new TypeToken>(){}.getType(); + Type localVarReturnType = new TypeToken>(){}.getType(); localVarApiClient.executeAsync(localVarCall, localVarReturnType, _callback); return localVarCall; } diff --git a/src/main/java/io/akeyless/client/model/CreateDBTarget.java b/src/main/java/io/akeyless/client/model/CreateDBTarget.java index 5d0c06b1..8ead8085 100644 --- a/src/main/java/io/akeyless/client/model/CreateDBTarget.java +++ b/src/main/java/io/akeyless/client/model/CreateDBTarget.java @@ -49,6 +49,10 @@ public class CreateDBTarget { @SerializedName(SERIALIZED_NAME_CLOUD_SERVICE_PROVIDER) private String cloudServiceProvider; + public static final String SERIALIZED_NAME_CLUSTER_MODE = "cluster-mode"; + @SerializedName(SERIALIZED_NAME_CLUSTER_MODE) + private Boolean clusterMode; + public static final String SERIALIZED_NAME_COMMENT = "comment"; @SerializedName(SERIALIZED_NAME_COMMENT) private String comment; @@ -283,6 +287,29 @@ public void setCloudServiceProvider(String cloudServiceProvider) { } + public CreateDBTarget clusterMode(Boolean clusterMode) { + + this.clusterMode = clusterMode; + return this; + } + + /** + * Cluster Mode + * @return clusterMode + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Cluster Mode") + + public Boolean getClusterMode() { + return clusterMode; + } + + + public void setClusterMode(Boolean clusterMode) { + this.clusterMode = clusterMode; + } + + public CreateDBTarget comment(String comment) { this.comment = comment; @@ -964,6 +991,7 @@ public boolean equals(Object o) { Objects.equals(this.azureClientSecret, createDBTarget.azureClientSecret) && Objects.equals(this.azureTenantId, createDBTarget.azureTenantId) && Objects.equals(this.cloudServiceProvider, createDBTarget.cloudServiceProvider) && + Objects.equals(this.clusterMode, createDBTarget.clusterMode) && Objects.equals(this.comment, createDBTarget.comment) && Objects.equals(this.connectionType, createDBTarget.connectionType) && Objects.equals(this.dbName, createDBTarget.dbName) && @@ -997,7 +1025,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(dbDefinedConnectionType, azureClientId, azureClientSecret, azureTenantId, cloudServiceProvider, comment, connectionType, dbName, dbServerCertificates, dbServerName, dbType, description, host, json, key, maxVersions, mongodbAtlas, mongodbAtlasApiPrivateKey, mongodbAtlasApiPublicKey, mongodbAtlasProjectId, mongodbDefaultAuthDb, mongodbUriOptions, name, oracleServiceName, port, pwd, snowflakeAccount, snowflakeApiPrivateKey, snowflakeApiPrivateKeyPassword, ssl, sslCertificate, token, uidToken, userName); + return Objects.hash(dbDefinedConnectionType, azureClientId, azureClientSecret, azureTenantId, cloudServiceProvider, clusterMode, comment, connectionType, dbName, dbServerCertificates, dbServerName, dbType, description, host, json, key, maxVersions, mongodbAtlas, mongodbAtlasApiPrivateKey, mongodbAtlasApiPublicKey, mongodbAtlasProjectId, mongodbDefaultAuthDb, mongodbUriOptions, name, oracleServiceName, port, pwd, snowflakeAccount, snowflakeApiPrivateKey, snowflakeApiPrivateKeyPassword, ssl, sslCertificate, token, uidToken, userName); } @Override @@ -1009,6 +1037,7 @@ public String toString() { sb.append(" azureClientSecret: ").append(toIndentedString(azureClientSecret)).append("\n"); sb.append(" azureTenantId: ").append(toIndentedString(azureTenantId)).append("\n"); sb.append(" cloudServiceProvider: ").append(toIndentedString(cloudServiceProvider)).append("\n"); + sb.append(" clusterMode: ").append(toIndentedString(clusterMode)).append("\n"); sb.append(" comment: ").append(toIndentedString(comment)).append("\n"); sb.append(" connectionType: ").append(toIndentedString(connectionType)).append("\n"); sb.append(" dbName: ").append(toIndentedString(dbName)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreateNativeK8STarget.java b/src/main/java/io/akeyless/client/model/CreateNativeK8STarget.java index 51e562c9..370ea5eb 100644 --- a/src/main/java/io/akeyless/client/model/CreateNativeK8STarget.java +++ b/src/main/java/io/akeyless/client/model/CreateNativeK8STarget.java @@ -61,6 +61,10 @@ public class CreateNativeK8STarget { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint = "dummy_val"; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s-cluster-name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_CLUSTER_TOKEN = "k8s-cluster-token"; @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_TOKEN) private String k8sClusterToken = "dummy_val"; @@ -276,6 +280,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public CreateNativeK8STarget k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * K8S cluster name + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S cluster name") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public CreateNativeK8STarget k8sClusterToken(String k8sClusterToken) { this.k8sClusterToken = k8sClusterToken; @@ -454,6 +481,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sClientKey, createNativeK8STarget.k8sClientKey) && Objects.equals(this.k8sClusterCaCert, createNativeK8STarget.k8sClusterCaCert) && Objects.equals(this.k8sClusterEndpoint, createNativeK8STarget.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, createNativeK8STarget.k8sClusterName) && Objects.equals(this.k8sClusterToken, createNativeK8STarget.k8sClusterToken) && Objects.equals(this.key, createNativeK8STarget.key) && Objects.equals(this.maxVersions, createNativeK8STarget.maxVersions) && @@ -465,7 +493,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(comment, description, json, k8sAuthType, k8sClientCertificate, k8sClientKey, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterToken, key, maxVersions, name, token, uidToken, useGwServiceAccount); + return Objects.hash(comment, description, json, k8sAuthType, k8sClientCertificate, k8sClientKey, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterName, k8sClusterToken, key, maxVersions, name, token, uidToken, useGwServiceAccount); } @Override @@ -480,6 +508,7 @@ public String toString() { sb.append(" k8sClientKey: ").append(toIndentedString(k8sClientKey)).append("\n"); sb.append(" k8sClusterCaCert: ").append(toIndentedString(k8sClusterCaCert)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sClusterToken: ").append(toIndentedString(k8sClusterToken)).append("\n"); sb.append(" key: ").append(toIndentedString(key)).append("\n"); sb.append(" maxVersions: ").append(toIndentedString(maxVersions)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java b/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java index 3dd1f2d5..1e4e96d8 100644 --- a/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java +++ b/src/main/java/io/akeyless/client/model/CreatePKICertIssuer.java @@ -173,7 +173,7 @@ public class CreatePKICertIssuer { public static final String SERIALIZED_NAME_TTL = "ttl"; @SerializedName(SERIALIZED_NAME_TTL) - private Long ttl; + private String ttl; public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; @SerializedName(SERIALIZED_NAME_UID_TOKEN) @@ -1003,7 +1003,7 @@ public void setToken(String token) { } - public CreatePKICertIssuer ttl(Long ttl) { + public CreatePKICertIssuer ttl(String ttl) { this.ttl = ttl; return this; @@ -1016,12 +1016,12 @@ public CreatePKICertIssuer ttl(Long ttl) { @javax.annotation.Nonnull @ApiModelProperty(required = true, value = "The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs") - public Long getTtl() { + public String getTtl() { return ttl; } - public void setTtl(Long ttl) { + public void setTtl(String ttl) { this.ttl = ttl; } diff --git a/src/main/java/io/akeyless/client/model/DSProducerDetails.java b/src/main/java/io/akeyless/client/model/DSProducerDetails.java index 351c0d83..6969c60f 100644 --- a/src/main/java/io/akeyless/client/model/DSProducerDetails.java +++ b/src/main/java/io/akeyless/client/model/DSProducerDetails.java @@ -227,6 +227,10 @@ public class DSProducerDetails { @SerializedName(SERIALIZED_NAME_CLOUD_SERVICE_PROVIDER) private String cloudServiceProvider; + public static final String SERIALIZED_NAME_CLUSTER_MODE = "cluster_mode"; + @SerializedName(SERIALIZED_NAME_CLUSTER_MODE) + private Boolean clusterMode; + public static final String SERIALIZED_NAME_CONNECTION_TYPE = "connection_type"; @SerializedName(SERIALIZED_NAME_CONNECTION_TYPE) private String connectionType; @@ -463,6 +467,30 @@ public class DSProducerDetails { @SerializedName(SERIALIZED_NAME_GKE_SERVICE_ACCOUNT_NAME) private String gkeServiceAccountName; + public static final String SERIALIZED_NAME_GOOGLE_WORKSPACE_ACCESS_MODE = "google_workspace_access_mode"; + @SerializedName(SERIALIZED_NAME_GOOGLE_WORKSPACE_ACCESS_MODE) + private String googleWorkspaceAccessMode; + + public static final String SERIALIZED_NAME_GOOGLE_WORKSPACE_ADMIN_NAME = "google_workspace_admin_name"; + @SerializedName(SERIALIZED_NAME_GOOGLE_WORKSPACE_ADMIN_NAME) + private String googleWorkspaceAdminName; + + public static final String SERIALIZED_NAME_GOOGLE_WORKSPACE_GROUP_NAME = "google_workspace_group_name"; + @SerializedName(SERIALIZED_NAME_GOOGLE_WORKSPACE_GROUP_NAME) + private String googleWorkspaceGroupName; + + public static final String SERIALIZED_NAME_GOOGLE_WORKSPACE_GROUP_ROLE = "google_workspace_group_role"; + @SerializedName(SERIALIZED_NAME_GOOGLE_WORKSPACE_GROUP_ROLE) + private String googleWorkspaceGroupRole; + + public static final String SERIALIZED_NAME_GOOGLE_WORKSPACE_ROLE_NAME = "google_workspace_role_name"; + @SerializedName(SERIALIZED_NAME_GOOGLE_WORKSPACE_ROLE_NAME) + private String googleWorkspaceRoleName; + + public static final String SERIALIZED_NAME_GOOGLE_WORKSPACE_ROLE_SCOPE = "google_workspace_role_scope"; + @SerializedName(SERIALIZED_NAME_GOOGLE_WORKSPACE_ROLE_SCOPE) + private String googleWorkspaceRoleScope; + public static final String SERIALIZED_NAME_GRANT_TYPES = "grant_types"; @SerializedName(SERIALIZED_NAME_GRANT_TYPES) private List grantTypes = null; @@ -539,6 +567,10 @@ public class DSProducerDetails { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s_cluster_name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_DYNAMIC_MODE = "k8s_dynamic_mode"; @SerializedName(SERIALIZED_NAME_K8S_DYNAMIC_MODE) private Boolean k8sDynamicMode; @@ -2034,6 +2066,29 @@ public void setCloudServiceProvider(String cloudServiceProvider) { } + public DSProducerDetails clusterMode(Boolean clusterMode) { + + this.clusterMode = clusterMode; + return this; + } + + /** + * Get clusterMode + * @return clusterMode + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getClusterMode() { + return clusterMode; + } + + + public void setClusterMode(Boolean clusterMode) { + this.clusterMode = clusterMode; + } + + public DSProducerDetails connectionType(String connectionType) { this.connectionType = connectionType; @@ -3423,6 +3478,144 @@ public void setGkeServiceAccountName(String gkeServiceAccountName) { } + public DSProducerDetails googleWorkspaceAccessMode(String googleWorkspaceAccessMode) { + + this.googleWorkspaceAccessMode = googleWorkspaceAccessMode; + return this; + } + + /** + * Get googleWorkspaceAccessMode + * @return googleWorkspaceAccessMode + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGoogleWorkspaceAccessMode() { + return googleWorkspaceAccessMode; + } + + + public void setGoogleWorkspaceAccessMode(String googleWorkspaceAccessMode) { + this.googleWorkspaceAccessMode = googleWorkspaceAccessMode; + } + + + public DSProducerDetails googleWorkspaceAdminName(String googleWorkspaceAdminName) { + + this.googleWorkspaceAdminName = googleWorkspaceAdminName; + return this; + } + + /** + * Get googleWorkspaceAdminName + * @return googleWorkspaceAdminName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGoogleWorkspaceAdminName() { + return googleWorkspaceAdminName; + } + + + public void setGoogleWorkspaceAdminName(String googleWorkspaceAdminName) { + this.googleWorkspaceAdminName = googleWorkspaceAdminName; + } + + + public DSProducerDetails googleWorkspaceGroupName(String googleWorkspaceGroupName) { + + this.googleWorkspaceGroupName = googleWorkspaceGroupName; + return this; + } + + /** + * Get googleWorkspaceGroupName + * @return googleWorkspaceGroupName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGoogleWorkspaceGroupName() { + return googleWorkspaceGroupName; + } + + + public void setGoogleWorkspaceGroupName(String googleWorkspaceGroupName) { + this.googleWorkspaceGroupName = googleWorkspaceGroupName; + } + + + public DSProducerDetails googleWorkspaceGroupRole(String googleWorkspaceGroupRole) { + + this.googleWorkspaceGroupRole = googleWorkspaceGroupRole; + return this; + } + + /** + * Get googleWorkspaceGroupRole + * @return googleWorkspaceGroupRole + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGoogleWorkspaceGroupRole() { + return googleWorkspaceGroupRole; + } + + + public void setGoogleWorkspaceGroupRole(String googleWorkspaceGroupRole) { + this.googleWorkspaceGroupRole = googleWorkspaceGroupRole; + } + + + public DSProducerDetails googleWorkspaceRoleName(String googleWorkspaceRoleName) { + + this.googleWorkspaceRoleName = googleWorkspaceRoleName; + return this; + } + + /** + * Get googleWorkspaceRoleName + * @return googleWorkspaceRoleName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGoogleWorkspaceRoleName() { + return googleWorkspaceRoleName; + } + + + public void setGoogleWorkspaceRoleName(String googleWorkspaceRoleName) { + this.googleWorkspaceRoleName = googleWorkspaceRoleName; + } + + + public DSProducerDetails googleWorkspaceRoleScope(String googleWorkspaceRoleScope) { + + this.googleWorkspaceRoleScope = googleWorkspaceRoleScope; + return this; + } + + /** + * Get googleWorkspaceRoleScope + * @return googleWorkspaceRoleScope + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGoogleWorkspaceRoleScope() { + return googleWorkspaceRoleScope; + } + + + public void setGoogleWorkspaceRoleScope(String googleWorkspaceRoleScope) { + this.googleWorkspaceRoleScope = googleWorkspaceRoleScope; + } + + public DSProducerDetails grantTypes(List grantTypes) { this.grantTypes = grantTypes; @@ -3876,6 +4069,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public DSProducerDetails k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * Get k8sClusterName + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public DSProducerDetails k8sDynamicMode(Boolean k8sDynamicMode) { this.k8sDynamicMode = k8sDynamicMode; @@ -6166,6 +6382,7 @@ public boolean equals(Object o) { Objects.equals(this.chefSkipSsl, dsProducerDetails.chefSkipSsl) && Objects.equals(this.clientAuthenticationType, dsProducerDetails.clientAuthenticationType) && Objects.equals(this.cloudServiceProvider, dsProducerDetails.cloudServiceProvider) && + Objects.equals(this.clusterMode, dsProducerDetails.clusterMode) && Objects.equals(this.connectionType, dsProducerDetails.connectionType) && Objects.equals(this.createSyncUrl, dsProducerDetails.createSyncUrl) && Objects.equals(this.dbClientId, dsProducerDetails.dbClientId) && @@ -6225,6 +6442,12 @@ public boolean equals(Object o) { Objects.equals(this.gkeClusterName, dsProducerDetails.gkeClusterName) && Objects.equals(this.gkeServiceAccountKey, dsProducerDetails.gkeServiceAccountKey) && Objects.equals(this.gkeServiceAccountName, dsProducerDetails.gkeServiceAccountName) && + Objects.equals(this.googleWorkspaceAccessMode, dsProducerDetails.googleWorkspaceAccessMode) && + Objects.equals(this.googleWorkspaceAdminName, dsProducerDetails.googleWorkspaceAdminName) && + Objects.equals(this.googleWorkspaceGroupName, dsProducerDetails.googleWorkspaceGroupName) && + Objects.equals(this.googleWorkspaceGroupRole, dsProducerDetails.googleWorkspaceGroupRole) && + Objects.equals(this.googleWorkspaceRoleName, dsProducerDetails.googleWorkspaceRoleName) && + Objects.equals(this.googleWorkspaceRoleScope, dsProducerDetails.googleWorkspaceRoleScope) && Objects.equals(this.grantTypes, dsProducerDetails.grantTypes) && Objects.equals(this.groups, dsProducerDetails.groups) && Objects.equals(this.hanadbCreationStatements, dsProducerDetails.hanadbCreationStatements) && @@ -6244,6 +6467,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sClientKeyData, dsProducerDetails.k8sClientKeyData) && Objects.equals(this.k8sClusterCaCertificate, dsProducerDetails.k8sClusterCaCertificate) && Objects.equals(this.k8sClusterEndpoint, dsProducerDetails.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, dsProducerDetails.k8sClusterName) && Objects.equals(this.k8sDynamicMode, dsProducerDetails.k8sDynamicMode) && Objects.equals(this.k8sMultipleDocYamlTempDefinition, dsProducerDetails.k8sMultipleDocYamlTempDefinition) && Objects.equals(this.k8sNamespace, dsProducerDetails.k8sNamespace) && @@ -6343,7 +6567,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accessTokenManagerId, aclRules, active, adminName, adminPwd, adminRotationIntervalDays, administrativePort, artifactoryAdminApikey, artifactoryAdminUsername, artifactoryBaseUrl, artifactoryTokenAudience, artifactoryTokenScope, authorizationPort, awsAccessKeyId, awsAccessMode, awsRegion, awsRoleArns, awsSecretAccessKey, awsSessionToken, awsUserConsoleAccess, awsUserGroups, awsUserPolicies, awsUserProgrammaticAccess, azureAppObjectId, azureClientId, azureClientSecret, azureFixedUserNameSubClaimKey, azureFixedUserOnly, azureResourceGroupName, azureResourceName, azureSubscriptionId, azureTenantId, azureUserGroupsObjId, azureUserPortalAccess, azureUserProgrammaticAccess, azureUserRolesTemplateId, azureUsername, cassandraCreationStatements, chefOrganizations, chefServerAccessMode, chefServerHostName, chefServerKey, chefServerPort, chefServerUrl, chefServerUsername, chefSkipSsl, clientAuthenticationType, cloudServiceProvider, connectionType, createSyncUrl, dbClientId, dbClientSecret, dbHostName, dbIsolationLevel, dbMaxIdleConns, dbMaxOpenConns, dbName, dbPort, dbPrivateKey, dbPrivateKeyPassphrase, dbPwd, dbServerCertificates, dbServerName, dbTenantId, dbUserName, deleteProtection, dynamicSecretId, dynamicSecretKey, dynamicSecretName, dynamicSecretType, eksAccessKeyId, eksAssumeRole, eksClusterCaCertificate, eksClusterEndpoint, eksClusterName, eksRegion, eksSecretAccessKey, enableAdminRotation, enforceReplayPrevention, externallyProvidedUser, failureMessage, fixedUserOnly, gcpKeyAlgo, gcpRoleBindings, gcpServiceAccountEmail, gcpServiceAccountKey, gcpServiceAccountKeyBase64, gcpServiceAccountKeyId, gcpServiceAccountType, gcpTmpServiceAccountName, gcpTokenLifetime, gcpTokenScope, gcpTokenType, githubAppId, githubAppPrivateKey, githubBaseUrl, githubInstallationId, githubInstallationTokenPermissions, githubInstallationTokenRepositories, githubInstallationTokenRepositoriesIds, githubOrganizationName, githubRepositoryPath, gkeClusterCaCertificate, gkeClusterEndpoint, gkeClusterName, gkeServiceAccountKey, gkeServiceAccountName, grantTypes, groups, hanadbCreationStatements, hanadbRevocationStatements, hostName, hostPort, implementationType, isFixedUser, issuer, itemTargetsAssoc, jwks, jwksUrl, k8sAllowedNamespaces, k8sAuthType, k8sBearerToken, k8sClientCertData, k8sClientKeyData, k8sClusterCaCertificate, k8sClusterEndpoint, k8sDynamicMode, k8sMultipleDocYamlTempDefinition, k8sNamespace, k8sRoleName, k8sRoleType, k8sServiceAccount, lastAdminRotation, ldapAudience, ldapBindDn, ldapBindPassword, ldapCertificate, ldapGroupDn, ldapTokenExpiration, ldapUrl, ldapUserAttr, ldapUserDn, metadata, mongodbAtlasApiPrivateKey, mongodbAtlasApiPublicKey, mongodbAtlasProjectId, mongodbCustomData, mongodbDbName, mongodbDefaultAuthDb, mongodbHostPort, mongodbIsAtlas, mongodbPassword, mongodbRoles, mongodbUriConnection, mongodbUriOptions, mongodbUsername, mssqlCreationStatements, mssqlRevocationStatements, mysqlCreationStatements, mysqlRevocationStatements, oracleCreationStatements, oracleRevocationStatements, password, passwordLength, passwordPolicy, payload, pingUrl, postgresCreationStatements, postgresRevocationStatements, privilegedUser, rabbitmqServerPassword, rabbitmqServerUri, rabbitmqServerUser, rabbitmqUserConfPermission, rabbitmqUserReadPermission, rabbitmqUserTags, rabbitmqUserVhost, rabbitmqUserWritePermission, redirectUris, redshiftCreationStatements, restrictedScopes, revokeSyncUrl, rotateSyncUrl, scopes, secureRemoteAccessDetails, sessionExtensionWarnIntervalMin, sfAccount, sfUserRole, sfWarehouseName, shouldStop, signingAlgorithm, sslConnectionCertificate, sslConnectionMode, subjectDn, tags, timeoutSeconds, useGwCloudIdentity, useGwServiceAccount, userName, userPassword, userPrincipalName, userTtl, usernameLength, usernamePolicy, venafiAllowSubdomains, venafiAllowedDomains, venafiApiKey, venafiAutoGeneratedFolder, venafiBaseUrl, venafiRootFirstInChain, venafiSignUsingAkeylessPki, venafiSignerKeyName, venafiStorePrivateKey, venafiTppAccessToken, venafiTppClientId, venafiTppPassword, venafiTppRefreshToken, venafiTppUsername, venafiUseTpp, venafiZone, warnBeforeUserExpirationMin); + return Objects.hash(accessTokenManagerId, aclRules, active, adminName, adminPwd, adminRotationIntervalDays, administrativePort, artifactoryAdminApikey, artifactoryAdminUsername, artifactoryBaseUrl, artifactoryTokenAudience, artifactoryTokenScope, authorizationPort, awsAccessKeyId, awsAccessMode, awsRegion, awsRoleArns, awsSecretAccessKey, awsSessionToken, awsUserConsoleAccess, awsUserGroups, awsUserPolicies, awsUserProgrammaticAccess, azureAppObjectId, azureClientId, azureClientSecret, azureFixedUserNameSubClaimKey, azureFixedUserOnly, azureResourceGroupName, azureResourceName, azureSubscriptionId, azureTenantId, azureUserGroupsObjId, azureUserPortalAccess, azureUserProgrammaticAccess, azureUserRolesTemplateId, azureUsername, cassandraCreationStatements, chefOrganizations, chefServerAccessMode, chefServerHostName, chefServerKey, chefServerPort, chefServerUrl, chefServerUsername, chefSkipSsl, clientAuthenticationType, cloudServiceProvider, clusterMode, connectionType, createSyncUrl, dbClientId, dbClientSecret, dbHostName, dbIsolationLevel, dbMaxIdleConns, dbMaxOpenConns, dbName, dbPort, dbPrivateKey, dbPrivateKeyPassphrase, dbPwd, dbServerCertificates, dbServerName, dbTenantId, dbUserName, deleteProtection, dynamicSecretId, dynamicSecretKey, dynamicSecretName, dynamicSecretType, eksAccessKeyId, eksAssumeRole, eksClusterCaCertificate, eksClusterEndpoint, eksClusterName, eksRegion, eksSecretAccessKey, enableAdminRotation, enforceReplayPrevention, externallyProvidedUser, failureMessage, fixedUserOnly, gcpKeyAlgo, gcpRoleBindings, gcpServiceAccountEmail, gcpServiceAccountKey, gcpServiceAccountKeyBase64, gcpServiceAccountKeyId, gcpServiceAccountType, gcpTmpServiceAccountName, gcpTokenLifetime, gcpTokenScope, gcpTokenType, githubAppId, githubAppPrivateKey, githubBaseUrl, githubInstallationId, githubInstallationTokenPermissions, githubInstallationTokenRepositories, githubInstallationTokenRepositoriesIds, githubOrganizationName, githubRepositoryPath, gkeClusterCaCertificate, gkeClusterEndpoint, gkeClusterName, gkeServiceAccountKey, gkeServiceAccountName, googleWorkspaceAccessMode, googleWorkspaceAdminName, googleWorkspaceGroupName, googleWorkspaceGroupRole, googleWorkspaceRoleName, googleWorkspaceRoleScope, grantTypes, groups, hanadbCreationStatements, hanadbRevocationStatements, hostName, hostPort, implementationType, isFixedUser, issuer, itemTargetsAssoc, jwks, jwksUrl, k8sAllowedNamespaces, k8sAuthType, k8sBearerToken, k8sClientCertData, k8sClientKeyData, k8sClusterCaCertificate, k8sClusterEndpoint, k8sClusterName, k8sDynamicMode, k8sMultipleDocYamlTempDefinition, k8sNamespace, k8sRoleName, k8sRoleType, k8sServiceAccount, lastAdminRotation, ldapAudience, ldapBindDn, ldapBindPassword, ldapCertificate, ldapGroupDn, ldapTokenExpiration, ldapUrl, ldapUserAttr, ldapUserDn, metadata, mongodbAtlasApiPrivateKey, mongodbAtlasApiPublicKey, mongodbAtlasProjectId, mongodbCustomData, mongodbDbName, mongodbDefaultAuthDb, mongodbHostPort, mongodbIsAtlas, mongodbPassword, mongodbRoles, mongodbUriConnection, mongodbUriOptions, mongodbUsername, mssqlCreationStatements, mssqlRevocationStatements, mysqlCreationStatements, mysqlRevocationStatements, oracleCreationStatements, oracleRevocationStatements, password, passwordLength, passwordPolicy, payload, pingUrl, postgresCreationStatements, postgresRevocationStatements, privilegedUser, rabbitmqServerPassword, rabbitmqServerUri, rabbitmqServerUser, rabbitmqUserConfPermission, rabbitmqUserReadPermission, rabbitmqUserTags, rabbitmqUserVhost, rabbitmqUserWritePermission, redirectUris, redshiftCreationStatements, restrictedScopes, revokeSyncUrl, rotateSyncUrl, scopes, secureRemoteAccessDetails, sessionExtensionWarnIntervalMin, sfAccount, sfUserRole, sfWarehouseName, shouldStop, signingAlgorithm, sslConnectionCertificate, sslConnectionMode, subjectDn, tags, timeoutSeconds, useGwCloudIdentity, useGwServiceAccount, userName, userPassword, userPrincipalName, userTtl, usernameLength, usernamePolicy, venafiAllowSubdomains, venafiAllowedDomains, venafiApiKey, venafiAutoGeneratedFolder, venafiBaseUrl, venafiRootFirstInChain, venafiSignUsingAkeylessPki, venafiSignerKeyName, venafiStorePrivateKey, venafiTppAccessToken, venafiTppClientId, venafiTppPassword, venafiTppRefreshToken, venafiTppUsername, venafiUseTpp, venafiZone, warnBeforeUserExpirationMin); } @Override @@ -6398,6 +6622,7 @@ public String toString() { sb.append(" chefSkipSsl: ").append(toIndentedString(chefSkipSsl)).append("\n"); sb.append(" clientAuthenticationType: ").append(toIndentedString(clientAuthenticationType)).append("\n"); sb.append(" cloudServiceProvider: ").append(toIndentedString(cloudServiceProvider)).append("\n"); + sb.append(" clusterMode: ").append(toIndentedString(clusterMode)).append("\n"); sb.append(" connectionType: ").append(toIndentedString(connectionType)).append("\n"); sb.append(" createSyncUrl: ").append(toIndentedString(createSyncUrl)).append("\n"); sb.append(" dbClientId: ").append(toIndentedString(dbClientId)).append("\n"); @@ -6457,6 +6682,12 @@ public String toString() { sb.append(" gkeClusterName: ").append(toIndentedString(gkeClusterName)).append("\n"); sb.append(" gkeServiceAccountKey: ").append(toIndentedString(gkeServiceAccountKey)).append("\n"); sb.append(" gkeServiceAccountName: ").append(toIndentedString(gkeServiceAccountName)).append("\n"); + sb.append(" googleWorkspaceAccessMode: ").append(toIndentedString(googleWorkspaceAccessMode)).append("\n"); + sb.append(" googleWorkspaceAdminName: ").append(toIndentedString(googleWorkspaceAdminName)).append("\n"); + sb.append(" googleWorkspaceGroupName: ").append(toIndentedString(googleWorkspaceGroupName)).append("\n"); + sb.append(" googleWorkspaceGroupRole: ").append(toIndentedString(googleWorkspaceGroupRole)).append("\n"); + sb.append(" googleWorkspaceRoleName: ").append(toIndentedString(googleWorkspaceRoleName)).append("\n"); + sb.append(" googleWorkspaceRoleScope: ").append(toIndentedString(googleWorkspaceRoleScope)).append("\n"); sb.append(" grantTypes: ").append(toIndentedString(grantTypes)).append("\n"); sb.append(" groups: ").append(toIndentedString(groups)).append("\n"); sb.append(" hanadbCreationStatements: ").append(toIndentedString(hanadbCreationStatements)).append("\n"); @@ -6476,6 +6707,7 @@ public String toString() { sb.append(" k8sClientKeyData: ").append(toIndentedString(k8sClientKeyData)).append("\n"); sb.append(" k8sClusterCaCertificate: ").append(toIndentedString(k8sClusterCaCertificate)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sDynamicMode: ").append(toIndentedString(k8sDynamicMode)).append("\n"); sb.append(" k8sMultipleDocYamlTempDefinition: ").append(toIndentedString(k8sMultipleDocYamlTempDefinition)).append("\n"); sb.append(" k8sNamespace: ").append(toIndentedString(k8sNamespace)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/DbTargetDetails.java b/src/main/java/io/akeyless/client/model/DbTargetDetails.java index fa870b10..0416c29f 100644 --- a/src/main/java/io/akeyless/client/model/DbTargetDetails.java +++ b/src/main/java/io/akeyless/client/model/DbTargetDetails.java @@ -34,6 +34,10 @@ public class DbTargetDetails { @SerializedName(SERIALIZED_NAME_CLOUD_SERVICE_PROVIDER) private String cloudServiceProvider; + public static final String SERIALIZED_NAME_CLUSTER_MODE = "cluster_mode"; + @SerializedName(SERIALIZED_NAME_CLUSTER_MODE) + private Boolean clusterMode; + public static final String SERIALIZED_NAME_CONNECTION_TYPE = "connection_type"; @SerializedName(SERIALIZED_NAME_CONNECTION_TYPE) private String connectionType; @@ -124,6 +128,29 @@ public void setCloudServiceProvider(String cloudServiceProvider) { } + public DbTargetDetails clusterMode(Boolean clusterMode) { + + this.clusterMode = clusterMode; + return this; + } + + /** + * Get clusterMode + * @return clusterMode + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getClusterMode() { + return clusterMode; + } + + + public void setClusterMode(Boolean clusterMode) { + this.clusterMode = clusterMode; + } + + public DbTargetDetails connectionType(String connectionType) { this.connectionType = connectionType; @@ -502,6 +529,7 @@ public boolean equals(Object o) { } DbTargetDetails dbTargetDetails = (DbTargetDetails) o; return Objects.equals(this.cloudServiceProvider, dbTargetDetails.cloudServiceProvider) && + Objects.equals(this.clusterMode, dbTargetDetails.clusterMode) && Objects.equals(this.connectionType, dbTargetDetails.connectionType) && Objects.equals(this.dbClientId, dbTargetDetails.dbClientId) && Objects.equals(this.dbClientSecret, dbTargetDetails.dbClientSecret) && @@ -522,7 +550,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(cloudServiceProvider, connectionType, dbClientId, dbClientSecret, dbHostName, dbName, dbPort, dbPrivateKey, dbPrivateKeyPassphrase, dbPwd, dbServerCertificates, dbServerName, dbTenantId, dbUserName, sfAccount, sslConnectionCertificate, sslConnectionMode); + return Objects.hash(cloudServiceProvider, clusterMode, connectionType, dbClientId, dbClientSecret, dbHostName, dbName, dbPort, dbPrivateKey, dbPrivateKeyPassphrase, dbPwd, dbServerCertificates, dbServerName, dbTenantId, dbUserName, sfAccount, sslConnectionCertificate, sslConnectionMode); } @Override @@ -530,6 +558,7 @@ public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class DbTargetDetails {\n"); sb.append(" cloudServiceProvider: ").append(toIndentedString(cloudServiceProvider)).append("\n"); + sb.append(" clusterMode: ").append(toIndentedString(clusterMode)).append("\n"); sb.append(" connectionType: ").append(toIndentedString(connectionType)).append("\n"); sb.append(" dbClientId: ").append(toIndentedString(dbClientId)).append("\n"); sb.append(" dbClientSecret: ").append(toIndentedString(dbClientSecret)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspace.java b/src/main/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspace.java new file mode 100644 index 00000000..b7af6362 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspace.java @@ -0,0 +1,575 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; + +/** + * dynamicSecretCreateGoogleWorkspace is a command that creates Google Workspace dynamic secret + */ +@ApiModel(description = "dynamicSecretCreateGoogleWorkspace is a command that creates Google Workspace dynamic secret") +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class DynamicSecretCreateGoogleWorkspace { + public static final String SERIALIZED_NAME_ACCESS_MODE = "access-mode"; + @SerializedName(SERIALIZED_NAME_ACCESS_MODE) + private String accessMode; + + public static final String SERIALIZED_NAME_ADMIN_NAME = "admin-name"; + @SerializedName(SERIALIZED_NAME_ADMIN_NAME) + private String adminName; + + public static final String SERIALIZED_NAME_DELETE_PROTECTION = "delete_protection"; + @SerializedName(SERIALIZED_NAME_DELETE_PROTECTION) + private String deleteProtection; + + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + + public static final String SERIALIZED_NAME_GCP_KEY = "gcp-key"; + @SerializedName(SERIALIZED_NAME_GCP_KEY) + private String gcpKey; + + public static final String SERIALIZED_NAME_GROUP_NAME = "group-name"; + @SerializedName(SERIALIZED_NAME_GROUP_NAME) + private String groupName; + + public static final String SERIALIZED_NAME_GROUP_ROLE_TYPE = "group-role-type"; + @SerializedName(SERIALIZED_NAME_GROUP_ROLE_TYPE) + private String groupRoleType; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_NAME = "name"; + @SerializedName(SERIALIZED_NAME_NAME) + private String name; + + public static final String SERIALIZED_NAME_PRODUCER_ENCRYPTION_KEY_NAME = "producer-encryption-key-name"; + @SerializedName(SERIALIZED_NAME_PRODUCER_ENCRYPTION_KEY_NAME) + private String producerEncryptionKeyName; + + public static final String SERIALIZED_NAME_ROLE_NAME = "role-name"; + @SerializedName(SERIALIZED_NAME_ROLE_NAME) + private String roleName; + + public static final String SERIALIZED_NAME_ROLE_SCOPE = "role-scope"; + @SerializedName(SERIALIZED_NAME_ROLE_SCOPE) + private String roleScope; + + public static final String SERIALIZED_NAME_TAGS = "tags"; + @SerializedName(SERIALIZED_NAME_TAGS) + private List tags = null; + + public static final String SERIALIZED_NAME_TARGET_NAME = "target-name"; + @SerializedName(SERIALIZED_NAME_TARGET_NAME) + private String targetName; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public static final String SERIALIZED_NAME_USER_TTL = "user-ttl"; + @SerializedName(SERIALIZED_NAME_USER_TTL) + private String userTtl = "60m"; + + public DynamicSecretCreateGoogleWorkspace() { + } + + public DynamicSecretCreateGoogleWorkspace accessMode(String accessMode) { + + this.accessMode = accessMode; + return this; + } + + /** + * Get accessMode + * @return accessMode + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "") + + public String getAccessMode() { + return accessMode; + } + + + public void setAccessMode(String accessMode) { + this.accessMode = accessMode; + } + + + public DynamicSecretCreateGoogleWorkspace adminName(String adminName) { + + this.adminName = adminName; + return this; + } + + /** + * Admin user email + * @return adminName + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "Admin user email") + + public String getAdminName() { + return adminName; + } + + + public void setAdminName(String adminName) { + this.adminName = adminName; + } + + + public DynamicSecretCreateGoogleWorkspace deleteProtection(String deleteProtection) { + + this.deleteProtection = deleteProtection; + return this; + } + + /** + * Protection from accidental deletion of this item [true/false] + * @return deleteProtection + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Protection from accidental deletion of this item [true/false]") + + public String getDeleteProtection() { + return deleteProtection; + } + + + public void setDeleteProtection(String deleteProtection) { + this.deleteProtection = deleteProtection; + } + + + public DynamicSecretCreateGoogleWorkspace description(String description) { + + this.description = description; + return this; + } + + /** + * Description of the object + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Description of the object") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + + public DynamicSecretCreateGoogleWorkspace gcpKey(String gcpKey) { + + this.gcpKey = gcpKey; + return this; + } + + /** + * Base64-encoded service account private key text + * @return gcpKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Base64-encoded service account private key text") + + public String getGcpKey() { + return gcpKey; + } + + + public void setGcpKey(String gcpKey) { + this.gcpKey = gcpKey; + } + + + public DynamicSecretCreateGoogleWorkspace groupName(String groupName) { + + this.groupName = groupName; + return this; + } + + /** + * A group email, relevant only for group access-mode + * @return groupName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A group email, relevant only for group access-mode") + + public String getGroupName() { + return groupName; + } + + + public void setGroupName(String groupName) { + this.groupName = groupName; + } + + + public DynamicSecretCreateGoogleWorkspace groupRoleType(String groupRoleType) { + + this.groupRoleType = groupRoleType; + return this; + } + + /** + * Get groupRoleType + * @return groupRoleType + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGroupRoleType() { + return groupRoleType; + } + + + public void setGroupRoleType(String groupRoleType) { + this.groupRoleType = groupRoleType; + } + + + public DynamicSecretCreateGoogleWorkspace json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public DynamicSecretCreateGoogleWorkspace name(String name) { + + this.name = name; + return this; + } + + /** + * Dynamic secret name + * @return name + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "Dynamic secret name") + + public String getName() { + return name; + } + + + public void setName(String name) { + this.name = name; + } + + + public DynamicSecretCreateGoogleWorkspace producerEncryptionKeyName(String producerEncryptionKeyName) { + + this.producerEncryptionKeyName = producerEncryptionKeyName; + return this; + } + + /** + * Dynamic producer encryption key + * @return producerEncryptionKeyName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Dynamic producer encryption key") + + public String getProducerEncryptionKeyName() { + return producerEncryptionKeyName; + } + + + public void setProducerEncryptionKeyName(String producerEncryptionKeyName) { + this.producerEncryptionKeyName = producerEncryptionKeyName; + } + + + public DynamicSecretCreateGoogleWorkspace roleName(String roleName) { + + this.roleName = roleName; + return this; + } + + /** + * Name of the admin role to assign to the user, relevant only for role access-mode + * @return roleName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Name of the admin role to assign to the user, relevant only for role access-mode") + + public String getRoleName() { + return roleName; + } + + + public void setRoleName(String roleName) { + this.roleName = roleName; + } + + + public DynamicSecretCreateGoogleWorkspace roleScope(String roleScope) { + + this.roleScope = roleScope; + return this; + } + + /** + * Get roleScope + * @return roleScope + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getRoleScope() { + return roleScope; + } + + + public void setRoleScope(String roleScope) { + this.roleScope = roleScope; + } + + + public DynamicSecretCreateGoogleWorkspace tags(List tags) { + + this.tags = tags; + return this; + } + + public DynamicSecretCreateGoogleWorkspace addTagsItem(String tagsItem) { + if (this.tags == null) { + this.tags = new ArrayList(); + } + this.tags.add(tagsItem); + return this; + } + + /** + * Add tags attached to this object + * @return tags + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Add tags attached to this object") + + public List getTags() { + return tags; + } + + + public void setTags(List tags) { + this.tags = tags; + } + + + public DynamicSecretCreateGoogleWorkspace targetName(String targetName) { + + this.targetName = targetName; + return this; + } + + /** + * Name of existing target to use in producer creation + * @return targetName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Name of existing target to use in producer creation") + + public String getTargetName() { + return targetName; + } + + + public void setTargetName(String targetName) { + this.targetName = targetName; + } + + + public DynamicSecretCreateGoogleWorkspace token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public DynamicSecretCreateGoogleWorkspace uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + public DynamicSecretCreateGoogleWorkspace userTtl(String userTtl) { + + this.userTtl = userTtl; + return this; + } + + /** + * User TTL + * @return userTtl + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "User TTL") + + public String getUserTtl() { + return userTtl; + } + + + public void setUserTtl(String userTtl) { + this.userTtl = userTtl; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + DynamicSecretCreateGoogleWorkspace dynamicSecretCreateGoogleWorkspace = (DynamicSecretCreateGoogleWorkspace) o; + return Objects.equals(this.accessMode, dynamicSecretCreateGoogleWorkspace.accessMode) && + Objects.equals(this.adminName, dynamicSecretCreateGoogleWorkspace.adminName) && + Objects.equals(this.deleteProtection, dynamicSecretCreateGoogleWorkspace.deleteProtection) && + Objects.equals(this.description, dynamicSecretCreateGoogleWorkspace.description) && + Objects.equals(this.gcpKey, dynamicSecretCreateGoogleWorkspace.gcpKey) && + Objects.equals(this.groupName, dynamicSecretCreateGoogleWorkspace.groupName) && + Objects.equals(this.groupRoleType, dynamicSecretCreateGoogleWorkspace.groupRoleType) && + Objects.equals(this.json, dynamicSecretCreateGoogleWorkspace.json) && + Objects.equals(this.name, dynamicSecretCreateGoogleWorkspace.name) && + Objects.equals(this.producerEncryptionKeyName, dynamicSecretCreateGoogleWorkspace.producerEncryptionKeyName) && + Objects.equals(this.roleName, dynamicSecretCreateGoogleWorkspace.roleName) && + Objects.equals(this.roleScope, dynamicSecretCreateGoogleWorkspace.roleScope) && + Objects.equals(this.tags, dynamicSecretCreateGoogleWorkspace.tags) && + Objects.equals(this.targetName, dynamicSecretCreateGoogleWorkspace.targetName) && + Objects.equals(this.token, dynamicSecretCreateGoogleWorkspace.token) && + Objects.equals(this.uidToken, dynamicSecretCreateGoogleWorkspace.uidToken) && + Objects.equals(this.userTtl, dynamicSecretCreateGoogleWorkspace.userTtl); + } + + @Override + public int hashCode() { + return Objects.hash(accessMode, adminName, deleteProtection, description, gcpKey, groupName, groupRoleType, json, name, producerEncryptionKeyName, roleName, roleScope, tags, targetName, token, uidToken, userTtl); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class DynamicSecretCreateGoogleWorkspace {\n"); + sb.append(" accessMode: ").append(toIndentedString(accessMode)).append("\n"); + sb.append(" adminName: ").append(toIndentedString(adminName)).append("\n"); + sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); + sb.append(" gcpKey: ").append(toIndentedString(gcpKey)).append("\n"); + sb.append(" groupName: ").append(toIndentedString(groupName)).append("\n"); + sb.append(" groupRoleType: ").append(toIndentedString(groupRoleType)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" name: ").append(toIndentedString(name)).append("\n"); + sb.append(" producerEncryptionKeyName: ").append(toIndentedString(producerEncryptionKeyName)).append("\n"); + sb.append(" roleName: ").append(toIndentedString(roleName)).append("\n"); + sb.append(" roleScope: ").append(toIndentedString(roleScope)).append("\n"); + sb.append(" tags: ").append(toIndentedString(tags)).append("\n"); + sb.append(" targetName: ").append(toIndentedString(targetName)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" userTtl: ").append(toIndentedString(userTtl)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/DynamicSecretCreateK8s.java b/src/main/java/io/akeyless/client/model/DynamicSecretCreateK8s.java index c2768c1d..045fe1c6 100644 --- a/src/main/java/io/akeyless/client/model/DynamicSecretCreateK8s.java +++ b/src/main/java/io/akeyless/client/model/DynamicSecretCreateK8s.java @@ -56,6 +56,10 @@ public class DynamicSecretCreateK8s { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s-cluster-name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_CLUSTER_TOKEN = "k8s-cluster-token"; @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_TOKEN) private String k8sClusterToken; @@ -289,6 +293,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public DynamicSecretCreateK8s k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * K8S cluster name + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S cluster name") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public DynamicSecretCreateK8s k8sClusterToken(String k8sClusterToken) { this.k8sClusterToken = k8sClusterToken; @@ -841,6 +868,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sAllowedNamespaces, dynamicSecretCreateK8s.k8sAllowedNamespaces) && Objects.equals(this.k8sClusterCaCert, dynamicSecretCreateK8s.k8sClusterCaCert) && Objects.equals(this.k8sClusterEndpoint, dynamicSecretCreateK8s.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, dynamicSecretCreateK8s.k8sClusterName) && Objects.equals(this.k8sClusterToken, dynamicSecretCreateK8s.k8sClusterToken) && Objects.equals(this.k8sNamespace, dynamicSecretCreateK8s.k8sNamespace) && Objects.equals(this.k8sPredefinedRoleName, dynamicSecretCreateK8s.k8sPredefinedRoleName) && @@ -868,7 +896,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(deleteProtection, description, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); + return Objects.hash(deleteProtection, description, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterName, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); } @Override @@ -881,6 +909,7 @@ public String toString() { sb.append(" k8sAllowedNamespaces: ").append(toIndentedString(k8sAllowedNamespaces)).append("\n"); sb.append(" k8sClusterCaCert: ").append(toIndentedString(k8sClusterCaCert)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sClusterToken: ").append(toIndentedString(k8sClusterToken)).append("\n"); sb.append(" k8sNamespace: ").append(toIndentedString(k8sNamespace)).append("\n"); sb.append(" k8sPredefinedRoleName: ").append(toIndentedString(k8sPredefinedRoleName)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/DynamicSecretGet.java b/src/main/java/io/akeyless/client/model/DynamicSecretGet.java index f5617e11..fc37a203 100644 --- a/src/main/java/io/akeyless/client/model/DynamicSecretGet.java +++ b/src/main/java/io/akeyless/client/model/DynamicSecretGet.java @@ -25,9 +25,9 @@ import java.io.IOException; /** - * DynamicSecretGet is a command that returns dynamic secret details + * dynamicSecretGet is a command that returns dynamic secret details */ -@ApiModel(description = "DynamicSecretGet is a command that returns dynamic secret details") +@ApiModel(description = "dynamicSecretGet is a command that returns dynamic secret details") @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class DynamicSecretGet { public static final String SERIALIZED_NAME_JSON = "json"; diff --git a/src/main/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspace.java b/src/main/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspace.java new file mode 100644 index 00000000..baaf1c67 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspace.java @@ -0,0 +1,604 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; + +/** + * dynamicSecretUpdateGoogleWorkspace is a command that updates a Google Workspace dynamic secret + */ +@ApiModel(description = "dynamicSecretUpdateGoogleWorkspace is a command that updates a Google Workspace dynamic secret") +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class DynamicSecretUpdateGoogleWorkspace { + public static final String SERIALIZED_NAME_ACCESS_MODE = "access-mode"; + @SerializedName(SERIALIZED_NAME_ACCESS_MODE) + private String accessMode; + + public static final String SERIALIZED_NAME_ADMIN_NAME = "admin-name"; + @SerializedName(SERIALIZED_NAME_ADMIN_NAME) + private String adminName; + + public static final String SERIALIZED_NAME_DELETE_PROTECTION = "delete_protection"; + @SerializedName(SERIALIZED_NAME_DELETE_PROTECTION) + private String deleteProtection; + + public static final String SERIALIZED_NAME_DESCRIPTION = "description"; + @SerializedName(SERIALIZED_NAME_DESCRIPTION) + private String description; + + public static final String SERIALIZED_NAME_GCP_KEY = "gcp-key"; + @SerializedName(SERIALIZED_NAME_GCP_KEY) + private String gcpKey; + + public static final String SERIALIZED_NAME_GROUP_NAME = "group-name"; + @SerializedName(SERIALIZED_NAME_GROUP_NAME) + private String groupName; + + public static final String SERIALIZED_NAME_GROUP_ROLE_TYPE = "group-role-type"; + @SerializedName(SERIALIZED_NAME_GROUP_ROLE_TYPE) + private String groupRoleType; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_NAME = "name"; + @SerializedName(SERIALIZED_NAME_NAME) + private String name; + + public static final String SERIALIZED_NAME_NEW_NAME = "new-name"; + @SerializedName(SERIALIZED_NAME_NEW_NAME) + private String newName; + + public static final String SERIALIZED_NAME_PRODUCER_ENCRYPTION_KEY_NAME = "producer-encryption-key-name"; + @SerializedName(SERIALIZED_NAME_PRODUCER_ENCRYPTION_KEY_NAME) + private String producerEncryptionKeyName; + + public static final String SERIALIZED_NAME_ROLE_NAME = "role-name"; + @SerializedName(SERIALIZED_NAME_ROLE_NAME) + private String roleName; + + public static final String SERIALIZED_NAME_ROLE_SCOPE = "role-scope"; + @SerializedName(SERIALIZED_NAME_ROLE_SCOPE) + private String roleScope; + + public static final String SERIALIZED_NAME_TAGS = "tags"; + @SerializedName(SERIALIZED_NAME_TAGS) + private List tags = null; + + public static final String SERIALIZED_NAME_TARGET_NAME = "target-name"; + @SerializedName(SERIALIZED_NAME_TARGET_NAME) + private String targetName; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public static final String SERIALIZED_NAME_USER_TTL = "user-ttl"; + @SerializedName(SERIALIZED_NAME_USER_TTL) + private String userTtl = "60m"; + + public DynamicSecretUpdateGoogleWorkspace() { + } + + public DynamicSecretUpdateGoogleWorkspace accessMode(String accessMode) { + + this.accessMode = accessMode; + return this; + } + + /** + * Get accessMode + * @return accessMode + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "") + + public String getAccessMode() { + return accessMode; + } + + + public void setAccessMode(String accessMode) { + this.accessMode = accessMode; + } + + + public DynamicSecretUpdateGoogleWorkspace adminName(String adminName) { + + this.adminName = adminName; + return this; + } + + /** + * Admin user email + * @return adminName + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "Admin user email") + + public String getAdminName() { + return adminName; + } + + + public void setAdminName(String adminName) { + this.adminName = adminName; + } + + + public DynamicSecretUpdateGoogleWorkspace deleteProtection(String deleteProtection) { + + this.deleteProtection = deleteProtection; + return this; + } + + /** + * Protection from accidental deletion of this item [true/false] + * @return deleteProtection + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Protection from accidental deletion of this item [true/false]") + + public String getDeleteProtection() { + return deleteProtection; + } + + + public void setDeleteProtection(String deleteProtection) { + this.deleteProtection = deleteProtection; + } + + + public DynamicSecretUpdateGoogleWorkspace description(String description) { + + this.description = description; + return this; + } + + /** + * Description of the object + * @return description + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Description of the object") + + public String getDescription() { + return description; + } + + + public void setDescription(String description) { + this.description = description; + } + + + public DynamicSecretUpdateGoogleWorkspace gcpKey(String gcpKey) { + + this.gcpKey = gcpKey; + return this; + } + + /** + * Base64-encoded service account private key text + * @return gcpKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Base64-encoded service account private key text") + + public String getGcpKey() { + return gcpKey; + } + + + public void setGcpKey(String gcpKey) { + this.gcpKey = gcpKey; + } + + + public DynamicSecretUpdateGoogleWorkspace groupName(String groupName) { + + this.groupName = groupName; + return this; + } + + /** + * A group email, relevant only for group access-mode + * @return groupName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A group email, relevant only for group access-mode") + + public String getGroupName() { + return groupName; + } + + + public void setGroupName(String groupName) { + this.groupName = groupName; + } + + + public DynamicSecretUpdateGoogleWorkspace groupRoleType(String groupRoleType) { + + this.groupRoleType = groupRoleType; + return this; + } + + /** + * Get groupRoleType + * @return groupRoleType + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getGroupRoleType() { + return groupRoleType; + } + + + public void setGroupRoleType(String groupRoleType) { + this.groupRoleType = groupRoleType; + } + + + public DynamicSecretUpdateGoogleWorkspace json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public DynamicSecretUpdateGoogleWorkspace name(String name) { + + this.name = name; + return this; + } + + /** + * Dynamic secret name + * @return name + **/ + @javax.annotation.Nonnull + @ApiModelProperty(required = true, value = "Dynamic secret name") + + public String getName() { + return name; + } + + + public void setName(String name) { + this.name = name; + } + + + public DynamicSecretUpdateGoogleWorkspace newName(String newName) { + + this.newName = newName; + return this; + } + + /** + * Dynamic secret new name + * @return newName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Dynamic secret new name") + + public String getNewName() { + return newName; + } + + + public void setNewName(String newName) { + this.newName = newName; + } + + + public DynamicSecretUpdateGoogleWorkspace producerEncryptionKeyName(String producerEncryptionKeyName) { + + this.producerEncryptionKeyName = producerEncryptionKeyName; + return this; + } + + /** + * Dynamic producer encryption key + * @return producerEncryptionKeyName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Dynamic producer encryption key") + + public String getProducerEncryptionKeyName() { + return producerEncryptionKeyName; + } + + + public void setProducerEncryptionKeyName(String producerEncryptionKeyName) { + this.producerEncryptionKeyName = producerEncryptionKeyName; + } + + + public DynamicSecretUpdateGoogleWorkspace roleName(String roleName) { + + this.roleName = roleName; + return this; + } + + /** + * Name of the admin role to assign to the user, relevant only for role access-mode + * @return roleName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Name of the admin role to assign to the user, relevant only for role access-mode") + + public String getRoleName() { + return roleName; + } + + + public void setRoleName(String roleName) { + this.roleName = roleName; + } + + + public DynamicSecretUpdateGoogleWorkspace roleScope(String roleScope) { + + this.roleScope = roleScope; + return this; + } + + /** + * Get roleScope + * @return roleScope + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getRoleScope() { + return roleScope; + } + + + public void setRoleScope(String roleScope) { + this.roleScope = roleScope; + } + + + public DynamicSecretUpdateGoogleWorkspace tags(List tags) { + + this.tags = tags; + return this; + } + + public DynamicSecretUpdateGoogleWorkspace addTagsItem(String tagsItem) { + if (this.tags == null) { + this.tags = new ArrayList(); + } + this.tags.add(tagsItem); + return this; + } + + /** + * Add tags attached to this object + * @return tags + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Add tags attached to this object") + + public List getTags() { + return tags; + } + + + public void setTags(List tags) { + this.tags = tags; + } + + + public DynamicSecretUpdateGoogleWorkspace targetName(String targetName) { + + this.targetName = targetName; + return this; + } + + /** + * Name of existing target to use in producer creation + * @return targetName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Name of existing target to use in producer creation") + + public String getTargetName() { + return targetName; + } + + + public void setTargetName(String targetName) { + this.targetName = targetName; + } + + + public DynamicSecretUpdateGoogleWorkspace token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public DynamicSecretUpdateGoogleWorkspace uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + public DynamicSecretUpdateGoogleWorkspace userTtl(String userTtl) { + + this.userTtl = userTtl; + return this; + } + + /** + * User TTL + * @return userTtl + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "User TTL") + + public String getUserTtl() { + return userTtl; + } + + + public void setUserTtl(String userTtl) { + this.userTtl = userTtl; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + DynamicSecretUpdateGoogleWorkspace dynamicSecretUpdateGoogleWorkspace = (DynamicSecretUpdateGoogleWorkspace) o; + return Objects.equals(this.accessMode, dynamicSecretUpdateGoogleWorkspace.accessMode) && + Objects.equals(this.adminName, dynamicSecretUpdateGoogleWorkspace.adminName) && + Objects.equals(this.deleteProtection, dynamicSecretUpdateGoogleWorkspace.deleteProtection) && + Objects.equals(this.description, dynamicSecretUpdateGoogleWorkspace.description) && + Objects.equals(this.gcpKey, dynamicSecretUpdateGoogleWorkspace.gcpKey) && + Objects.equals(this.groupName, dynamicSecretUpdateGoogleWorkspace.groupName) && + Objects.equals(this.groupRoleType, dynamicSecretUpdateGoogleWorkspace.groupRoleType) && + Objects.equals(this.json, dynamicSecretUpdateGoogleWorkspace.json) && + Objects.equals(this.name, dynamicSecretUpdateGoogleWorkspace.name) && + Objects.equals(this.newName, dynamicSecretUpdateGoogleWorkspace.newName) && + Objects.equals(this.producerEncryptionKeyName, dynamicSecretUpdateGoogleWorkspace.producerEncryptionKeyName) && + Objects.equals(this.roleName, dynamicSecretUpdateGoogleWorkspace.roleName) && + Objects.equals(this.roleScope, dynamicSecretUpdateGoogleWorkspace.roleScope) && + Objects.equals(this.tags, dynamicSecretUpdateGoogleWorkspace.tags) && + Objects.equals(this.targetName, dynamicSecretUpdateGoogleWorkspace.targetName) && + Objects.equals(this.token, dynamicSecretUpdateGoogleWorkspace.token) && + Objects.equals(this.uidToken, dynamicSecretUpdateGoogleWorkspace.uidToken) && + Objects.equals(this.userTtl, dynamicSecretUpdateGoogleWorkspace.userTtl); + } + + @Override + public int hashCode() { + return Objects.hash(accessMode, adminName, deleteProtection, description, gcpKey, groupName, groupRoleType, json, name, newName, producerEncryptionKeyName, roleName, roleScope, tags, targetName, token, uidToken, userTtl); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class DynamicSecretUpdateGoogleWorkspace {\n"); + sb.append(" accessMode: ").append(toIndentedString(accessMode)).append("\n"); + sb.append(" adminName: ").append(toIndentedString(adminName)).append("\n"); + sb.append(" deleteProtection: ").append(toIndentedString(deleteProtection)).append("\n"); + sb.append(" description: ").append(toIndentedString(description)).append("\n"); + sb.append(" gcpKey: ").append(toIndentedString(gcpKey)).append("\n"); + sb.append(" groupName: ").append(toIndentedString(groupName)).append("\n"); + sb.append(" groupRoleType: ").append(toIndentedString(groupRoleType)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" name: ").append(toIndentedString(name)).append("\n"); + sb.append(" newName: ").append(toIndentedString(newName)).append("\n"); + sb.append(" producerEncryptionKeyName: ").append(toIndentedString(producerEncryptionKeyName)).append("\n"); + sb.append(" roleName: ").append(toIndentedString(roleName)).append("\n"); + sb.append(" roleScope: ").append(toIndentedString(roleScope)).append("\n"); + sb.append(" tags: ").append(toIndentedString(tags)).append("\n"); + sb.append(" targetName: ").append(toIndentedString(targetName)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" userTtl: ").append(toIndentedString(userTtl)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/DynamicSecretUpdateK8s.java b/src/main/java/io/akeyless/client/model/DynamicSecretUpdateK8s.java index 41db99f0..2a659b91 100644 --- a/src/main/java/io/akeyless/client/model/DynamicSecretUpdateK8s.java +++ b/src/main/java/io/akeyless/client/model/DynamicSecretUpdateK8s.java @@ -56,6 +56,10 @@ public class DynamicSecretUpdateK8s { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s-cluster-name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_CLUSTER_TOKEN = "k8s-cluster-token"; @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_TOKEN) private String k8sClusterToken; @@ -293,6 +297,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public DynamicSecretUpdateK8s k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * K8S cluster name + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S cluster name") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public DynamicSecretUpdateK8s k8sClusterToken(String k8sClusterToken) { this.k8sClusterToken = k8sClusterToken; @@ -868,6 +895,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sAllowedNamespaces, dynamicSecretUpdateK8s.k8sAllowedNamespaces) && Objects.equals(this.k8sClusterCaCert, dynamicSecretUpdateK8s.k8sClusterCaCert) && Objects.equals(this.k8sClusterEndpoint, dynamicSecretUpdateK8s.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, dynamicSecretUpdateK8s.k8sClusterName) && Objects.equals(this.k8sClusterToken, dynamicSecretUpdateK8s.k8sClusterToken) && Objects.equals(this.k8sNamespace, dynamicSecretUpdateK8s.k8sNamespace) && Objects.equals(this.k8sPredefinedRoleName, dynamicSecretUpdateK8s.k8sPredefinedRoleName) && @@ -896,7 +924,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(deleteProtection, description, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, newName, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); + return Objects.hash(deleteProtection, description, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterName, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, newName, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); } @Override @@ -909,6 +937,7 @@ public String toString() { sb.append(" k8sAllowedNamespaces: ").append(toIndentedString(k8sAllowedNamespaces)).append("\n"); sb.append(" k8sClusterCaCert: ").append(toIndentedString(k8sClusterCaCert)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sClusterToken: ").append(toIndentedString(k8sClusterToken)).append("\n"); sb.append(" k8sNamespace: ").append(toIndentedString(k8sNamespace)).append("\n"); sb.append(" k8sPredefinedRoleName: ").append(toIndentedString(k8sPredefinedRoleName)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutput.java b/src/main/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutput.java new file mode 100644 index 00000000..2903c2ed --- /dev/null +++ b/src/main/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutput.java @@ -0,0 +1,101 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.DSProducerDetails; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * GatewayCreateProducerGoogleWorkspaceOutput + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class GatewayCreateProducerGoogleWorkspaceOutput { + public static final String SERIALIZED_NAME_PRODUCER_DETAILS = "producer_details"; + @SerializedName(SERIALIZED_NAME_PRODUCER_DETAILS) + private DSProducerDetails producerDetails; + + public GatewayCreateProducerGoogleWorkspaceOutput() { + } + + public GatewayCreateProducerGoogleWorkspaceOutput producerDetails(DSProducerDetails producerDetails) { + + this.producerDetails = producerDetails; + return this; + } + + /** + * Get producerDetails + * @return producerDetails + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public DSProducerDetails getProducerDetails() { + return producerDetails; + } + + + public void setProducerDetails(DSProducerDetails producerDetails) { + this.producerDetails = producerDetails; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + GatewayCreateProducerGoogleWorkspaceOutput gatewayCreateProducerGoogleWorkspaceOutput = (GatewayCreateProducerGoogleWorkspaceOutput) o; + return Objects.equals(this.producerDetails, gatewayCreateProducerGoogleWorkspaceOutput.producerDetails); + } + + @Override + public int hashCode() { + return Objects.hash(producerDetails); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class GatewayCreateProducerGoogleWorkspaceOutput {\n"); + sb.append(" producerDetails: ").append(toIndentedString(producerDetails)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/GatewayCreateProducerNativeK8S.java b/src/main/java/io/akeyless/client/model/GatewayCreateProducerNativeK8S.java index eb55d88f..ce2a6bf1 100644 --- a/src/main/java/io/akeyless/client/model/GatewayCreateProducerNativeK8S.java +++ b/src/main/java/io/akeyless/client/model/GatewayCreateProducerNativeK8S.java @@ -52,6 +52,10 @@ public class GatewayCreateProducerNativeK8S { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s-cluster-name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_CLUSTER_TOKEN = "k8s-cluster-token"; @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_TOKEN) private String k8sClusterToken; @@ -262,6 +266,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public GatewayCreateProducerNativeK8S k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * K8S cluster name + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S cluster name") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public GatewayCreateProducerNativeK8S k8sClusterToken(String k8sClusterToken) { this.k8sClusterToken = k8sClusterToken; @@ -813,6 +840,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sAllowedNamespaces, gatewayCreateProducerNativeK8S.k8sAllowedNamespaces) && Objects.equals(this.k8sClusterCaCert, gatewayCreateProducerNativeK8S.k8sClusterCaCert) && Objects.equals(this.k8sClusterEndpoint, gatewayCreateProducerNativeK8S.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, gatewayCreateProducerNativeK8S.k8sClusterName) && Objects.equals(this.k8sClusterToken, gatewayCreateProducerNativeK8S.k8sClusterToken) && Objects.equals(this.k8sNamespace, gatewayCreateProducerNativeK8S.k8sNamespace) && Objects.equals(this.k8sPredefinedRoleName, gatewayCreateProducerNativeK8S.k8sPredefinedRoleName) && @@ -840,7 +868,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(deleteProtection, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); + return Objects.hash(deleteProtection, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterName, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); } @Override @@ -852,6 +880,7 @@ public String toString() { sb.append(" k8sAllowedNamespaces: ").append(toIndentedString(k8sAllowedNamespaces)).append("\n"); sb.append(" k8sClusterCaCert: ").append(toIndentedString(k8sClusterCaCert)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sClusterToken: ").append(toIndentedString(k8sClusterToken)).append("\n"); sb.append(" k8sNamespace: ").append(toIndentedString(k8sNamespace)).append("\n"); sb.append(" k8sPredefinedRoleName: ").append(toIndentedString(k8sPredefinedRoleName)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfig.java b/src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfig.java new file mode 100644 index 00000000..c4821478 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfig.java @@ -0,0 +1,680 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * GatewayPartialUpdateK8SAuthConfig + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class GatewayPartialUpdateK8SAuthConfig { + public static final String SERIALIZED_NAME_USE_DEFAULT_IDENTITY_BOOL = "UseDefaultIdentityBool"; + @SerializedName(SERIALIZED_NAME_USE_DEFAULT_IDENTITY_BOOL) + private Boolean useDefaultIdentityBool; + + public static final String SERIALIZED_NAME_ACCESS_ID = "access-id"; + @SerializedName(SERIALIZED_NAME_ACCESS_ID) + private String accessId; + + public static final String SERIALIZED_NAME_CONFIG_ENCRYPTION_KEY_NAME = "config-encryption-key-name"; + @SerializedName(SERIALIZED_NAME_CONFIG_ENCRYPTION_KEY_NAME) + private String configEncryptionKeyName; + + public static final String SERIALIZED_NAME_DISABLE_ISSUER_VALIDATION = "disable-issuer-validation"; + @SerializedName(SERIALIZED_NAME_DISABLE_ISSUER_VALIDATION) + private String disableIssuerValidation; + + public static final String SERIALIZED_NAME_JSON = "json"; + @SerializedName(SERIALIZED_NAME_JSON) + private Boolean json = false; + + public static final String SERIALIZED_NAME_K8S_AUTH_TYPE = "k8s-auth-type"; + @SerializedName(SERIALIZED_NAME_K8S_AUTH_TYPE) + private String k8sAuthType = "token"; + + public static final String SERIALIZED_NAME_K8S_CA_CERT = "k8s-ca-cert"; + @SerializedName(SERIALIZED_NAME_K8S_CA_CERT) + private String k8sCaCert; + + public static final String SERIALIZED_NAME_K8S_CLIENT_CERTIFICATE = "k8s-client-certificate"; + @SerializedName(SERIALIZED_NAME_K8S_CLIENT_CERTIFICATE) + private String k8sClientCertificate; + + public static final String SERIALIZED_NAME_K8S_CLIENT_KEY = "k8s-client-key"; + @SerializedName(SERIALIZED_NAME_K8S_CLIENT_KEY) + private String k8sClientKey; + + public static final String SERIALIZED_NAME_K8S_HOST = "k8s-host"; + @SerializedName(SERIALIZED_NAME_K8S_HOST) + private String k8sHost; + + public static final String SERIALIZED_NAME_K8S_ISSUER = "k8s-issuer"; + @SerializedName(SERIALIZED_NAME_K8S_ISSUER) + private String k8sIssuer; + + public static final String SERIALIZED_NAME_NAME = "name"; + @SerializedName(SERIALIZED_NAME_NAME) + private String name; + + public static final String SERIALIZED_NAME_NEW_NAME = "new-name"; + @SerializedName(SERIALIZED_NAME_NEW_NAME) + private String newName; + + public static final String SERIALIZED_NAME_RANCHER_API_KEY = "rancher-api-key"; + @SerializedName(SERIALIZED_NAME_RANCHER_API_KEY) + private String rancherApiKey; + + public static final String SERIALIZED_NAME_RANCHER_CLUSTER_ID = "rancher-cluster-id"; + @SerializedName(SERIALIZED_NAME_RANCHER_CLUSTER_ID) + private String rancherClusterId; + + public static final String SERIALIZED_NAME_SIGNING_KEY = "signing-key"; + @SerializedName(SERIALIZED_NAME_SIGNING_KEY) + private String signingKey; + + public static final String SERIALIZED_NAME_TOKEN = "token"; + @SerializedName(SERIALIZED_NAME_TOKEN) + private String token; + + public static final String SERIALIZED_NAME_TOKEN_EXP = "token-exp"; + @SerializedName(SERIALIZED_NAME_TOKEN_EXP) + private Long tokenExp; + + public static final String SERIALIZED_NAME_TOKEN_REVIEWER_JWT = "token-reviewer-jwt"; + @SerializedName(SERIALIZED_NAME_TOKEN_REVIEWER_JWT) + private String tokenReviewerJwt; + + public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; + @SerializedName(SERIALIZED_NAME_UID_TOKEN) + private String uidToken; + + public static final String SERIALIZED_NAME_USE_GW_SERVICE_ACCOUNT = "use-gw-service-account"; + @SerializedName(SERIALIZED_NAME_USE_GW_SERVICE_ACCOUNT) + private String useGwServiceAccount; + + public GatewayPartialUpdateK8SAuthConfig() { + } + + public GatewayPartialUpdateK8SAuthConfig useDefaultIdentityBool(Boolean useDefaultIdentityBool) { + + this.useDefaultIdentityBool = useDefaultIdentityBool; + return this; + } + + /** + * Get useDefaultIdentityBool + * @return useDefaultIdentityBool + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Boolean getUseDefaultIdentityBool() { + return useDefaultIdentityBool; + } + + + public void setUseDefaultIdentityBool(Boolean useDefaultIdentityBool) { + this.useDefaultIdentityBool = useDefaultIdentityBool; + } + + + public GatewayPartialUpdateK8SAuthConfig accessId(String accessId) { + + this.accessId = accessId; + return this; + } + + /** + * The access ID of the Kubernetes auth method + * @return accessId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The access ID of the Kubernetes auth method") + + public String getAccessId() { + return accessId; + } + + + public void setAccessId(String accessId) { + this.accessId = accessId; + } + + + public GatewayPartialUpdateK8SAuthConfig configEncryptionKeyName(String configEncryptionKeyName) { + + this.configEncryptionKeyName = configEncryptionKeyName; + return this; + } + + /** + * Config encryption key + * @return configEncryptionKeyName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Config encryption key") + + public String getConfigEncryptionKeyName() { + return configEncryptionKeyName; + } + + + public void setConfigEncryptionKeyName(String configEncryptionKeyName) { + this.configEncryptionKeyName = configEncryptionKeyName; + } + + + public GatewayPartialUpdateK8SAuthConfig disableIssuerValidation(String disableIssuerValidation) { + + this.disableIssuerValidation = disableIssuerValidation; + return this; + } + + /** + * Disable issuer validation [true/false] + * @return disableIssuerValidation + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Disable issuer validation [true/false]") + + public String getDisableIssuerValidation() { + return disableIssuerValidation; + } + + + public void setDisableIssuerValidation(String disableIssuerValidation) { + this.disableIssuerValidation = disableIssuerValidation; + } + + + public GatewayPartialUpdateK8SAuthConfig json(Boolean json) { + + this.json = json; + return this; + } + + /** + * Set output format to JSON + * @return json + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Set output format to JSON") + + public Boolean getJson() { + return json; + } + + + public void setJson(Boolean json) { + this.json = json; + } + + + public GatewayPartialUpdateK8SAuthConfig k8sAuthType(String k8sAuthType) { + + this.k8sAuthType = k8sAuthType; + return this; + } + + /** + * K8S auth type [token/certificate]. (relevant for \"native_k8s\" only) + * @return k8sAuthType + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S auth type [token/certificate]. (relevant for \"native_k8s\" only)") + + public String getK8sAuthType() { + return k8sAuthType; + } + + + public void setK8sAuthType(String k8sAuthType) { + this.k8sAuthType = k8sAuthType; + } + + + public GatewayPartialUpdateK8SAuthConfig k8sCaCert(String k8sCaCert) { + + this.k8sCaCert = k8sCaCert; + return this; + } + + /** + * The CA Certificate (base64 encoded) to use to call into the kubernetes API server + * @return k8sCaCert + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The CA Certificate (base64 encoded) to use to call into the kubernetes API server") + + public String getK8sCaCert() { + return k8sCaCert; + } + + + public void setK8sCaCert(String k8sCaCert) { + this.k8sCaCert = k8sCaCert; + } + + + public GatewayPartialUpdateK8SAuthConfig k8sClientCertificate(String k8sClientCertificate) { + + this.k8sClientCertificate = k8sClientCertificate; + return this; + } + + /** + * Content of the k8 client certificate (PEM format) in a Base64 format (relevant for \"native_k8s\" only) + * @return k8sClientCertificate + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Content of the k8 client certificate (PEM format) in a Base64 format (relevant for \"native_k8s\" only)") + + public String getK8sClientCertificate() { + return k8sClientCertificate; + } + + + public void setK8sClientCertificate(String k8sClientCertificate) { + this.k8sClientCertificate = k8sClientCertificate; + } + + + public GatewayPartialUpdateK8SAuthConfig k8sClientKey(String k8sClientKey) { + + this.k8sClientKey = k8sClientKey; + return this; + } + + /** + * Content of the k8 client private key (PEM format) in a Base64 format (relevant for \"native_k8s\" only) + * @return k8sClientKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Content of the k8 client private key (PEM format) in a Base64 format (relevant for \"native_k8s\" only)") + + public String getK8sClientKey() { + return k8sClientKey; + } + + + public void setK8sClientKey(String k8sClientKey) { + this.k8sClientKey = k8sClientKey; + } + + + public GatewayPartialUpdateK8SAuthConfig k8sHost(String k8sHost) { + + this.k8sHost = k8sHost; + return this; + } + + /** + * The URL of the kubernetes API server + * @return k8sHost + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The URL of the kubernetes API server") + + public String getK8sHost() { + return k8sHost; + } + + + public void setK8sHost(String k8sHost) { + this.k8sHost = k8sHost; + } + + + public GatewayPartialUpdateK8SAuthConfig k8sIssuer(String k8sIssuer) { + + this.k8sIssuer = k8sIssuer; + return this; + } + + /** + * The Kubernetes JWT issuer name. K8SIssuer is the claim that specifies who issued the Kubernetes token + * @return k8sIssuer + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The Kubernetes JWT issuer name. K8SIssuer is the claim that specifies who issued the Kubernetes token") + + public String getK8sIssuer() { + return k8sIssuer; + } + + + public void setK8sIssuer(String k8sIssuer) { + this.k8sIssuer = k8sIssuer; + } + + + public GatewayPartialUpdateK8SAuthConfig name(String name) { + + this.name = name; + return this; + } + + /** + * K8S Auth config name + * @return name + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S Auth config name") + + public String getName() { + return name; + } + + + public void setName(String name) { + this.name = name; + } + + + public GatewayPartialUpdateK8SAuthConfig newName(String newName) { + + this.newName = newName; + return this; + } + + /** + * K8S Auth config new name + * @return newName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S Auth config new name") + + public String getNewName() { + return newName; + } + + + public void setNewName(String newName) { + this.newName = newName; + } + + + public GatewayPartialUpdateK8SAuthConfig rancherApiKey(String rancherApiKey) { + + this.rancherApiKey = rancherApiKey; + return this; + } + + /** + * The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only) + * @return rancherApiKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only)") + + public String getRancherApiKey() { + return rancherApiKey; + } + + + public void setRancherApiKey(String rancherApiKey) { + this.rancherApiKey = rancherApiKey; + } + + + public GatewayPartialUpdateK8SAuthConfig rancherClusterId(String rancherClusterId) { + + this.rancherClusterId = rancherClusterId; + return this; + } + + /** + * The cluster id as define in rancher (relevant for \"rancher\" only) + * @return rancherClusterId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The cluster id as define in rancher (relevant for \"rancher\" only)") + + public String getRancherClusterId() { + return rancherClusterId; + } + + + public void setRancherClusterId(String rancherClusterId) { + this.rancherClusterId = rancherClusterId; + } + + + public GatewayPartialUpdateK8SAuthConfig signingKey(String signingKey) { + + this.signingKey = signingKey; + return this; + } + + /** + * The private key (base64 encoded) associated with the public key defined in the Kubernetes auth + * @return signingKey + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The private key (base64 encoded) associated with the public key defined in the Kubernetes auth") + + public String getSigningKey() { + return signingKey; + } + + + public void setSigningKey(String signingKey) { + this.signingKey = signingKey; + } + + + public GatewayPartialUpdateK8SAuthConfig token(String token) { + + this.token = token; + return this; + } + + /** + * Authentication token (see `/auth` and `/configure`) + * @return token + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Authentication token (see `/auth` and `/configure`)") + + public String getToken() { + return token; + } + + + public void setToken(String token) { + this.token = token; + } + + + public GatewayPartialUpdateK8SAuthConfig tokenExp(Long tokenExp) { + + this.tokenExp = tokenExp; + return this; + } + + /** + * Time in seconds of expiration of the Akeyless Kube Auth Method token + * @return tokenExp + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Time in seconds of expiration of the Akeyless Kube Auth Method token") + + public Long getTokenExp() { + return tokenExp; + } + + + public void setTokenExp(Long tokenExp) { + this.tokenExp = tokenExp; + } + + + public GatewayPartialUpdateK8SAuthConfig tokenReviewerJwt(String tokenReviewerJwt) { + + this.tokenReviewerJwt = tokenReviewerJwt; + return this; + } + + /** + * A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. + * @return tokenReviewerJwt + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.") + + public String getTokenReviewerJwt() { + return tokenReviewerJwt; + } + + + public void setTokenReviewerJwt(String tokenReviewerJwt) { + this.tokenReviewerJwt = tokenReviewerJwt; + } + + + public GatewayPartialUpdateK8SAuthConfig uidToken(String uidToken) { + + this.uidToken = uidToken; + return this; + } + + /** + * The universal identity token, Required only for universal_identity authentication + * @return uidToken + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "The universal identity token, Required only for universal_identity authentication") + + public String getUidToken() { + return uidToken; + } + + + public void setUidToken(String uidToken) { + this.uidToken = uidToken; + } + + + public GatewayPartialUpdateK8SAuthConfig useGwServiceAccount(String useGwServiceAccount) { + + this.useGwServiceAccount = useGwServiceAccount; + return this; + } + + /** + * Use the GW's service account + * @return useGwServiceAccount + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Use the GW's service account") + + public String getUseGwServiceAccount() { + return useGwServiceAccount; + } + + + public void setUseGwServiceAccount(String useGwServiceAccount) { + this.useGwServiceAccount = useGwServiceAccount; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + GatewayPartialUpdateK8SAuthConfig gatewayPartialUpdateK8SAuthConfig = (GatewayPartialUpdateK8SAuthConfig) o; + return Objects.equals(this.useDefaultIdentityBool, gatewayPartialUpdateK8SAuthConfig.useDefaultIdentityBool) && + Objects.equals(this.accessId, gatewayPartialUpdateK8SAuthConfig.accessId) && + Objects.equals(this.configEncryptionKeyName, gatewayPartialUpdateK8SAuthConfig.configEncryptionKeyName) && + Objects.equals(this.disableIssuerValidation, gatewayPartialUpdateK8SAuthConfig.disableIssuerValidation) && + Objects.equals(this.json, gatewayPartialUpdateK8SAuthConfig.json) && + Objects.equals(this.k8sAuthType, gatewayPartialUpdateK8SAuthConfig.k8sAuthType) && + Objects.equals(this.k8sCaCert, gatewayPartialUpdateK8SAuthConfig.k8sCaCert) && + Objects.equals(this.k8sClientCertificate, gatewayPartialUpdateK8SAuthConfig.k8sClientCertificate) && + Objects.equals(this.k8sClientKey, gatewayPartialUpdateK8SAuthConfig.k8sClientKey) && + Objects.equals(this.k8sHost, gatewayPartialUpdateK8SAuthConfig.k8sHost) && + Objects.equals(this.k8sIssuer, gatewayPartialUpdateK8SAuthConfig.k8sIssuer) && + Objects.equals(this.name, gatewayPartialUpdateK8SAuthConfig.name) && + Objects.equals(this.newName, gatewayPartialUpdateK8SAuthConfig.newName) && + Objects.equals(this.rancherApiKey, gatewayPartialUpdateK8SAuthConfig.rancherApiKey) && + Objects.equals(this.rancherClusterId, gatewayPartialUpdateK8SAuthConfig.rancherClusterId) && + Objects.equals(this.signingKey, gatewayPartialUpdateK8SAuthConfig.signingKey) && + Objects.equals(this.token, gatewayPartialUpdateK8SAuthConfig.token) && + Objects.equals(this.tokenExp, gatewayPartialUpdateK8SAuthConfig.tokenExp) && + Objects.equals(this.tokenReviewerJwt, gatewayPartialUpdateK8SAuthConfig.tokenReviewerJwt) && + Objects.equals(this.uidToken, gatewayPartialUpdateK8SAuthConfig.uidToken) && + Objects.equals(this.useGwServiceAccount, gatewayPartialUpdateK8SAuthConfig.useGwServiceAccount); + } + + @Override + public int hashCode() { + return Objects.hash(useDefaultIdentityBool, accessId, configEncryptionKeyName, disableIssuerValidation, json, k8sAuthType, k8sCaCert, k8sClientCertificate, k8sClientKey, k8sHost, k8sIssuer, name, newName, rancherApiKey, rancherClusterId, signingKey, token, tokenExp, tokenReviewerJwt, uidToken, useGwServiceAccount); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class GatewayPartialUpdateK8SAuthConfig {\n"); + sb.append(" useDefaultIdentityBool: ").append(toIndentedString(useDefaultIdentityBool)).append("\n"); + sb.append(" accessId: ").append(toIndentedString(accessId)).append("\n"); + sb.append(" configEncryptionKeyName: ").append(toIndentedString(configEncryptionKeyName)).append("\n"); + sb.append(" disableIssuerValidation: ").append(toIndentedString(disableIssuerValidation)).append("\n"); + sb.append(" json: ").append(toIndentedString(json)).append("\n"); + sb.append(" k8sAuthType: ").append(toIndentedString(k8sAuthType)).append("\n"); + sb.append(" k8sCaCert: ").append(toIndentedString(k8sCaCert)).append("\n"); + sb.append(" k8sClientCertificate: ").append(toIndentedString(k8sClientCertificate)).append("\n"); + sb.append(" k8sClientKey: ").append(toIndentedString(k8sClientKey)).append("\n"); + sb.append(" k8sHost: ").append(toIndentedString(k8sHost)).append("\n"); + sb.append(" k8sIssuer: ").append(toIndentedString(k8sIssuer)).append("\n"); + sb.append(" name: ").append(toIndentedString(name)).append("\n"); + sb.append(" newName: ").append(toIndentedString(newName)).append("\n"); + sb.append(" rancherApiKey: ").append(toIndentedString(rancherApiKey)).append("\n"); + sb.append(" rancherClusterId: ").append(toIndentedString(rancherClusterId)).append("\n"); + sb.append(" signingKey: ").append(toIndentedString(signingKey)).append("\n"); + sb.append(" token: ").append(toIndentedString(token)).append("\n"); + sb.append(" tokenExp: ").append(toIndentedString(tokenExp)).append("\n"); + sb.append(" tokenReviewerJwt: ").append(toIndentedString(tokenReviewerJwt)).append("\n"); + sb.append(" uidToken: ").append(toIndentedString(uidToken)).append("\n"); + sb.append(" useGwServiceAccount: ").append(toIndentedString(useGwServiceAccount)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutput.java b/src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutput.java new file mode 100644 index 00000000..6f84bf80 --- /dev/null +++ b/src/main/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutput.java @@ -0,0 +1,159 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import java.util.Objects; +import java.util.Arrays; +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.ConfigChange; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; + +/** + * GatewayPartialUpdateK8SAuthConfigOutput + */ +@javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") +public class GatewayPartialUpdateK8SAuthConfigOutput { + public static final String SERIALIZED_NAME_CLUSTER_ID = "cluster_id"; + @SerializedName(SERIALIZED_NAME_CLUSTER_ID) + private String clusterId; + + public static final String SERIALIZED_NAME_PARTS_CHANGE = "parts_change"; + @SerializedName(SERIALIZED_NAME_PARTS_CHANGE) + private ConfigChange partsChange; + + public static final String SERIALIZED_NAME_TOTAL_HASH = "total_hash"; + @SerializedName(SERIALIZED_NAME_TOTAL_HASH) + private String totalHash; + + public GatewayPartialUpdateK8SAuthConfigOutput() { + } + + public GatewayPartialUpdateK8SAuthConfigOutput clusterId(String clusterId) { + + this.clusterId = clusterId; + return this; + } + + /** + * Get clusterId + * @return clusterId + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getClusterId() { + return clusterId; + } + + + public void setClusterId(String clusterId) { + this.clusterId = clusterId; + } + + + public GatewayPartialUpdateK8SAuthConfigOutput partsChange(ConfigChange partsChange) { + + this.partsChange = partsChange; + return this; + } + + /** + * Get partsChange + * @return partsChange + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public ConfigChange getPartsChange() { + return partsChange; + } + + + public void setPartsChange(ConfigChange partsChange) { + this.partsChange = partsChange; + } + + + public GatewayPartialUpdateK8SAuthConfigOutput totalHash(String totalHash) { + + this.totalHash = totalHash; + return this; + } + + /** + * Get totalHash + * @return totalHash + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getTotalHash() { + return totalHash; + } + + + public void setTotalHash(String totalHash) { + this.totalHash = totalHash; + } + + + @Override + public boolean equals(Object o) { + if (this == o) { + return true; + } + if (o == null || getClass() != o.getClass()) { + return false; + } + GatewayPartialUpdateK8SAuthConfigOutput gatewayPartialUpdateK8SAuthConfigOutput = (GatewayPartialUpdateK8SAuthConfigOutput) o; + return Objects.equals(this.clusterId, gatewayPartialUpdateK8SAuthConfigOutput.clusterId) && + Objects.equals(this.partsChange, gatewayPartialUpdateK8SAuthConfigOutput.partsChange) && + Objects.equals(this.totalHash, gatewayPartialUpdateK8SAuthConfigOutput.totalHash); + } + + @Override + public int hashCode() { + return Objects.hash(clusterId, partsChange, totalHash); + } + + @Override + public String toString() { + StringBuilder sb = new StringBuilder(); + sb.append("class GatewayPartialUpdateK8SAuthConfigOutput {\n"); + sb.append(" clusterId: ").append(toIndentedString(clusterId)).append("\n"); + sb.append(" partsChange: ").append(toIndentedString(partsChange)).append("\n"); + sb.append(" totalHash: ").append(toIndentedString(totalHash)).append("\n"); + sb.append("}"); + return sb.toString(); + } + + /** + * Convert the given object to string with each line indented by 4 spaces + * (except the first line). + */ + private String toIndentedString(Object o) { + if (o == null) { + return "null"; + } + return o.toString().replace("\n", "\n "); + } + +} + diff --git a/src/main/java/io/akeyless/client/model/GatewayUpdateProducerNativeK8S.java b/src/main/java/io/akeyless/client/model/GatewayUpdateProducerNativeK8S.java index 22a6e802..bd039481 100644 --- a/src/main/java/io/akeyless/client/model/GatewayUpdateProducerNativeK8S.java +++ b/src/main/java/io/akeyless/client/model/GatewayUpdateProducerNativeK8S.java @@ -52,6 +52,10 @@ public class GatewayUpdateProducerNativeK8S { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s-cluster-name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_CLUSTER_TOKEN = "k8s-cluster-token"; @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_TOKEN) private String k8sClusterToken; @@ -266,6 +270,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public GatewayUpdateProducerNativeK8S k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * K8S cluster name + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S cluster name") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public GatewayUpdateProducerNativeK8S k8sClusterToken(String k8sClusterToken) { this.k8sClusterToken = k8sClusterToken; @@ -840,6 +867,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sAllowedNamespaces, gatewayUpdateProducerNativeK8S.k8sAllowedNamespaces) && Objects.equals(this.k8sClusterCaCert, gatewayUpdateProducerNativeK8S.k8sClusterCaCert) && Objects.equals(this.k8sClusterEndpoint, gatewayUpdateProducerNativeK8S.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, gatewayUpdateProducerNativeK8S.k8sClusterName) && Objects.equals(this.k8sClusterToken, gatewayUpdateProducerNativeK8S.k8sClusterToken) && Objects.equals(this.k8sNamespace, gatewayUpdateProducerNativeK8S.k8sNamespace) && Objects.equals(this.k8sPredefinedRoleName, gatewayUpdateProducerNativeK8S.k8sPredefinedRoleName) && @@ -868,7 +896,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(deleteProtection, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, newName, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); + return Objects.hash(deleteProtection, json, k8sAllowedNamespaces, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterName, k8sClusterToken, k8sNamespace, k8sPredefinedRoleName, k8sPredefinedRoleType, k8sRolebindingYamlDef, k8sServiceAccount, k8sServiceAccountType, name, newName, producerEncryptionKeyName, secureAccessAllowPortForwading, secureAccessBastionIssuer, secureAccessClusterEndpoint, secureAccessDashboardUrl, secureAccessEnable, secureAccessWeb, secureAccessWebBrowsing, secureAccessWebProxy, tags, targetName, token, uidToken, useGwServiceAccount, userTtl); } @Override @@ -880,6 +908,7 @@ public String toString() { sb.append(" k8sAllowedNamespaces: ").append(toIndentedString(k8sAllowedNamespaces)).append("\n"); sb.append(" k8sClusterCaCert: ").append(toIndentedString(k8sClusterCaCert)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sClusterToken: ").append(toIndentedString(k8sClusterToken)).append("\n"); sb.append(" k8sNamespace: ").append(toIndentedString(k8sNamespace)).append("\n"); sb.append(" k8sPredefinedRoleName: ").append(toIndentedString(k8sPredefinedRoleName)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java b/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java index 3b16b383..17c99eee 100644 --- a/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java +++ b/src/main/java/io/akeyless/client/model/GetKubeExecCreds.java @@ -72,7 +72,7 @@ public class GetKubeExecCreds { public static final String SERIALIZED_NAME_TTL = "ttl"; @SerializedName(SERIALIZED_NAME_TTL) - private Long ttl; + private String ttl; public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; @SerializedName(SERIALIZED_NAME_UID_TOKEN) @@ -315,7 +315,7 @@ public void setToken(String token) { } - public GetKubeExecCreds ttl(Long ttl) { + public GetKubeExecCreds ttl(String ttl) { this.ttl = ttl; return this; @@ -328,12 +328,12 @@ public GetKubeExecCreds ttl(Long ttl) { @javax.annotation.Nullable @ApiModelProperty(value = "Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)") - public Long getTtl() { + public String getTtl() { return ttl; } - public void setTtl(Long ttl) { + public void setTtl(String ttl) { this.ttl = ttl; } diff --git a/src/main/java/io/akeyless/client/model/GetPKICertificate.java b/src/main/java/io/akeyless/client/model/GetPKICertificate.java index d9951eff..1a737b63 100644 --- a/src/main/java/io/akeyless/client/model/GetPKICertificate.java +++ b/src/main/java/io/akeyless/client/model/GetPKICertificate.java @@ -67,7 +67,7 @@ public class GetPKICertificate { public static final String SERIALIZED_NAME_TTL = "ttl"; @SerializedName(SERIALIZED_NAME_TTL) - private Long ttl; + private String ttl; public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; @SerializedName(SERIALIZED_NAME_UID_TOKEN) @@ -287,7 +287,7 @@ public void setToken(String token) { } - public GetPKICertificate ttl(Long ttl) { + public GetPKICertificate ttl(String ttl) { this.ttl = ttl; return this; @@ -300,12 +300,12 @@ public GetPKICertificate ttl(Long ttl) { @javax.annotation.Nullable @ApiModelProperty(value = "Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL)") - public Long getTtl() { + public String getTtl() { return ttl; } - public void setTtl(Long ttl) { + public void setTtl(String ttl) { this.ttl = ttl; } diff --git a/src/main/java/io/akeyless/client/model/ItemSraStatus.java b/src/main/java/io/akeyless/client/model/ItemSraStatus.java index c2ed70f9..2a330c3a 100644 --- a/src/main/java/io/akeyless/client/model/ItemSraStatus.java +++ b/src/main/java/io/akeyless/client/model/ItemSraStatus.java @@ -23,6 +23,9 @@ import io.swagger.annotations.ApiModel; import io.swagger.annotations.ApiModelProperty; import java.io.IOException; +import java.util.HashMap; +import java.util.List; +import java.util.Map; import org.threeten.bp.OffsetDateTime; /** @@ -30,168 +33,95 @@ */ @javax.annotation.Generated(value = "org.openapitools.codegen.languages.JavaClientCodegen") public class ItemSraStatus { - public static final String SERIALIZED_NAME_BASTION_ACCESS_ID = "bastion_access_id"; - @SerializedName(SERIALIZED_NAME_BASTION_ACCESS_ID) - private String bastionAccessId; + public static final String SERIALIZED_NAME_COUNT_INFO = "count_info"; + @SerializedName(SERIALIZED_NAME_COUNT_INFO) + private Map> countInfo = null; - public static final String SERIALIZED_NAME_BASTION_CLUSTER_NAME = "bastion_cluster_name"; - @SerializedName(SERIALIZED_NAME_BASTION_CLUSTER_NAME) - private String bastionClusterName; + public static final String SERIALIZED_NAME_IS_IN_USE = "is_in_use"; + @SerializedName(SERIALIZED_NAME_IS_IN_USE) + private Boolean isInUse; - public static final String SERIALIZED_NAME_BASTION_INSTANCE_ID = "bastion_instance_id"; - @SerializedName(SERIALIZED_NAME_BASTION_INSTANCE_ID) - private String bastionInstanceId; - - public static final String SERIALIZED_NAME_IS_IN_USED = "is_in_used"; - @SerializedName(SERIALIZED_NAME_IS_IN_USED) - private Boolean isInUsed; - - public static final String SERIALIZED_NAME_SESSION_ID = "session_id"; - @SerializedName(SERIALIZED_NAME_SESSION_ID) - private String sessionId; - - public static final String SERIALIZED_NAME_TIME = "time"; - @SerializedName(SERIALIZED_NAME_TIME) - private OffsetDateTime time; + public static final String SERIALIZED_NAME_LAST_USED_ITEM = "last_used_item"; + @SerializedName(SERIALIZED_NAME_LAST_USED_ITEM) + private OffsetDateTime lastUsedItem; public ItemSraStatus() { } - public ItemSraStatus bastionAccessId(String bastionAccessId) { - - this.bastionAccessId = bastionAccessId; - return this; - } - - /** - * Get bastionAccessId - * @return bastionAccessId - **/ - @javax.annotation.Nullable - @ApiModelProperty(value = "") - - public String getBastionAccessId() { - return bastionAccessId; - } - - - public void setBastionAccessId(String bastionAccessId) { - this.bastionAccessId = bastionAccessId; - } - - - public ItemSraStatus bastionClusterName(String bastionClusterName) { - - this.bastionClusterName = bastionClusterName; - return this; - } - - /** - * Get bastionClusterName - * @return bastionClusterName - **/ - @javax.annotation.Nullable - @ApiModelProperty(value = "") - - public String getBastionClusterName() { - return bastionClusterName; - } - - - public void setBastionClusterName(String bastionClusterName) { - this.bastionClusterName = bastionClusterName; - } - - - public ItemSraStatus bastionInstanceId(String bastionInstanceId) { + public ItemSraStatus countInfo(Map> countInfo) { - this.bastionInstanceId = bastionInstanceId; + this.countInfo = countInfo; return this; } - /** - * Get bastionInstanceId - * @return bastionInstanceId - **/ - @javax.annotation.Nullable - @ApiModelProperty(value = "") - - public String getBastionInstanceId() { - return bastionInstanceId; - } - - - public void setBastionInstanceId(String bastionInstanceId) { - this.bastionInstanceId = bastionInstanceId; - } - - - public ItemSraStatus isInUsed(Boolean isInUsed) { - - this.isInUsed = isInUsed; + public ItemSraStatus putCountInfoItem(String key, Map countInfoItem) { + if (this.countInfo == null) { + this.countInfo = new HashMap>(); + } + this.countInfo.put(key, countInfoItem); return this; } /** - * Get isInUsed - * @return isInUsed + * Get countInfo + * @return countInfo **/ @javax.annotation.Nullable @ApiModelProperty(value = "") - public Boolean getIsInUsed() { - return isInUsed; + public Map> getCountInfo() { + return countInfo; } - public void setIsInUsed(Boolean isInUsed) { - this.isInUsed = isInUsed; + public void setCountInfo(Map> countInfo) { + this.countInfo = countInfo; } - public ItemSraStatus sessionId(String sessionId) { + public ItemSraStatus isInUse(Boolean isInUse) { - this.sessionId = sessionId; + this.isInUse = isInUse; return this; } /** - * Get sessionId - * @return sessionId + * Get isInUse + * @return isInUse **/ @javax.annotation.Nullable @ApiModelProperty(value = "") - public String getSessionId() { - return sessionId; + public Boolean getIsInUse() { + return isInUse; } - public void setSessionId(String sessionId) { - this.sessionId = sessionId; + public void setIsInUse(Boolean isInUse) { + this.isInUse = isInUse; } - public ItemSraStatus time(OffsetDateTime time) { + public ItemSraStatus lastUsedItem(OffsetDateTime lastUsedItem) { - this.time = time; + this.lastUsedItem = lastUsedItem; return this; } /** - * Get time - * @return time + * Get lastUsedItem + * @return lastUsedItem **/ @javax.annotation.Nullable @ApiModelProperty(value = "") - public OffsetDateTime getTime() { - return time; + public OffsetDateTime getLastUsedItem() { + return lastUsedItem; } - public void setTime(OffsetDateTime time) { - this.time = time; + public void setLastUsedItem(OffsetDateTime lastUsedItem) { + this.lastUsedItem = lastUsedItem; } @@ -204,29 +134,23 @@ public boolean equals(Object o) { return false; } ItemSraStatus itemSraStatus = (ItemSraStatus) o; - return Objects.equals(this.bastionAccessId, itemSraStatus.bastionAccessId) && - Objects.equals(this.bastionClusterName, itemSraStatus.bastionClusterName) && - Objects.equals(this.bastionInstanceId, itemSraStatus.bastionInstanceId) && - Objects.equals(this.isInUsed, itemSraStatus.isInUsed) && - Objects.equals(this.sessionId, itemSraStatus.sessionId) && - Objects.equals(this.time, itemSraStatus.time); + return Objects.equals(this.countInfo, itemSraStatus.countInfo) && + Objects.equals(this.isInUse, itemSraStatus.isInUse) && + Objects.equals(this.lastUsedItem, itemSraStatus.lastUsedItem); } @Override public int hashCode() { - return Objects.hash(bastionAccessId, bastionClusterName, bastionInstanceId, isInUsed, sessionId, time); + return Objects.hash(countInfo, isInUse, lastUsedItem); } @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("class ItemSraStatus {\n"); - sb.append(" bastionAccessId: ").append(toIndentedString(bastionAccessId)).append("\n"); - sb.append(" bastionClusterName: ").append(toIndentedString(bastionClusterName)).append("\n"); - sb.append(" bastionInstanceId: ").append(toIndentedString(bastionInstanceId)).append("\n"); - sb.append(" isInUsed: ").append(toIndentedString(isInUsed)).append("\n"); - sb.append(" sessionId: ").append(toIndentedString(sessionId)).append("\n"); - sb.append(" time: ").append(toIndentedString(time)).append("\n"); + sb.append(" countInfo: ").append(toIndentedString(countInfo)).append("\n"); + sb.append(" isInUse: ").append(toIndentedString(isInUse)).append("\n"); + sb.append(" lastUsedItem: ").append(toIndentedString(lastUsedItem)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/main/java/io/akeyless/client/model/NativeK8sTargetDetails.java b/src/main/java/io/akeyless/client/model/NativeK8sTargetDetails.java index 26711737..63a68a36 100644 --- a/src/main/java/io/akeyless/client/model/NativeK8sTargetDetails.java +++ b/src/main/java/io/akeyless/client/model/NativeK8sTargetDetails.java @@ -53,6 +53,10 @@ public class NativeK8sTargetDetails { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s_cluster_name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_USE_GW_SERVICE_ACCOUNT = "use_gw_service_account"; @SerializedName(SERIALIZED_NAME_USE_GW_SERVICE_ACCOUNT) private Boolean useGwServiceAccount; @@ -198,6 +202,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public NativeK8sTargetDetails k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * Get k8sClusterName + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public NativeK8sTargetDetails useGwServiceAccount(Boolean useGwServiceAccount) { this.useGwServiceAccount = useGwServiceAccount; @@ -236,12 +263,13 @@ public boolean equals(Object o) { Objects.equals(this.k8sClientKeyData, nativeK8sTargetDetails.k8sClientKeyData) && Objects.equals(this.k8sClusterCaCertificate, nativeK8sTargetDetails.k8sClusterCaCertificate) && Objects.equals(this.k8sClusterEndpoint, nativeK8sTargetDetails.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, nativeK8sTargetDetails.k8sClusterName) && Objects.equals(this.useGwServiceAccount, nativeK8sTargetDetails.useGwServiceAccount); } @Override public int hashCode() { - return Objects.hash(k8sAuthType, k8sBearerToken, k8sClientCertData, k8sClientKeyData, k8sClusterCaCertificate, k8sClusterEndpoint, useGwServiceAccount); + return Objects.hash(k8sAuthType, k8sBearerToken, k8sClientCertData, k8sClientKeyData, k8sClusterCaCertificate, k8sClusterEndpoint, k8sClusterName, useGwServiceAccount); } @Override @@ -254,6 +282,7 @@ public String toString() { sb.append(" k8sClientKeyData: ").append(toIndentedString(k8sClientKeyData)).append("\n"); sb.append(" k8sClusterCaCertificate: ").append(toIndentedString(k8sClusterCaCertificate)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" useGwServiceAccount: ").append(toIndentedString(useGwServiceAccount)).append("\n"); sb.append("}"); return sb.toString(); diff --git a/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java b/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java index b4886416..66740b9d 100644 --- a/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java +++ b/src/main/java/io/akeyless/client/model/SecureRemoteAccess.java @@ -141,9 +141,9 @@ public class SecureRemoteAccess { @SerializedName(SERIALIZED_NAME_SSH_USER) private String sshUser; - public static final String SERIALIZED_NAME_STATUS = "status"; - @SerializedName(SERIALIZED_NAME_STATUS) - private ItemSraStatus status; + public static final String SERIALIZED_NAME_STATUS_INFO = "status_info"; + @SerializedName(SERIALIZED_NAME_STATUS_INFO) + private ItemSraStatus statusInfo; public static final String SERIALIZED_NAME_TARGET_HOSTS = "target_hosts"; @SerializedName(SERIALIZED_NAME_TARGET_HOSTS) @@ -797,26 +797,26 @@ public void setSshUser(String sshUser) { } - public SecureRemoteAccess status(ItemSraStatus status) { + public SecureRemoteAccess statusInfo(ItemSraStatus statusInfo) { - this.status = status; + this.statusInfo = statusInfo; return this; } /** - * Get status - * @return status + * Get statusInfo + * @return statusInfo **/ @javax.annotation.Nullable @ApiModelProperty(value = "") - public ItemSraStatus getStatus() { - return status; + public ItemSraStatus getStatusInfo() { + return statusInfo; } - public void setStatus(ItemSraStatus status) { - this.status = status; + public void setStatusInfo(ItemSraStatus statusInfo) { + this.statusInfo = statusInfo; } @@ -987,7 +987,7 @@ public boolean equals(Object o) { Objects.equals(this.sshPassword, secureRemoteAccess.sshPassword) && Objects.equals(this.sshPrivateKey, secureRemoteAccess.sshPrivateKey) && Objects.equals(this.sshUser, secureRemoteAccess.sshUser) && - Objects.equals(this.status, secureRemoteAccess.status) && + Objects.equals(this.statusInfo, secureRemoteAccess.statusInfo) && Objects.equals(this.targetHosts, secureRemoteAccess.targetHosts) && Objects.equals(this.targets, secureRemoteAccess.targets) && Objects.equals(this.url, secureRemoteAccess.url) && @@ -997,7 +997,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(accountId, allowPortForwarding, allowProvidingExternalUsername, bastionApi, bastionIssuer, bastionIssuerId, bastionSsh, category, dashboardUrl, dbName, domain, enable, endpoint, host, hostProviderType, isCli, isWeb, isolated, _native, rdGatewayServer, rdpUser, region, rotateAfterDisconnect, schema, sshPassword, sshPrivateKey, sshUser, status, targetHosts, targets, url, useInternalBastion, webProxy); + return Objects.hash(accountId, allowPortForwarding, allowProvidingExternalUsername, bastionApi, bastionIssuer, bastionIssuerId, bastionSsh, category, dashboardUrl, dbName, domain, enable, endpoint, host, hostProviderType, isCli, isWeb, isolated, _native, rdGatewayServer, rdpUser, region, rotateAfterDisconnect, schema, sshPassword, sshPrivateKey, sshUser, statusInfo, targetHosts, targets, url, useInternalBastion, webProxy); } @Override @@ -1031,7 +1031,7 @@ public String toString() { sb.append(" sshPassword: ").append(toIndentedString(sshPassword)).append("\n"); sb.append(" sshPrivateKey: ").append(toIndentedString(sshPrivateKey)).append("\n"); sb.append(" sshUser: ").append(toIndentedString(sshUser)).append("\n"); - sb.append(" status: ").append(toIndentedString(status)).append("\n"); + sb.append(" statusInfo: ").append(toIndentedString(statusInfo)).append("\n"); sb.append(" targetHosts: ").append(toIndentedString(targetHosts)).append("\n"); sb.append(" targets: ").append(toIndentedString(targets)).append("\n"); sb.append(" url: ").append(toIndentedString(url)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateDBTarget.java b/src/main/java/io/akeyless/client/model/UpdateDBTarget.java index f75fdda8..1f24c9f8 100644 --- a/src/main/java/io/akeyless/client/model/UpdateDBTarget.java +++ b/src/main/java/io/akeyless/client/model/UpdateDBTarget.java @@ -49,6 +49,10 @@ public class UpdateDBTarget { @SerializedName(SERIALIZED_NAME_CLOUD_SERVICE_PROVIDER) private String cloudServiceProvider; + public static final String SERIALIZED_NAME_CLUSTER_MODE = "cluster-mode"; + @SerializedName(SERIALIZED_NAME_CLUSTER_MODE) + private Boolean clusterMode; + public static final String SERIALIZED_NAME_COMMENT = "comment"; @SerializedName(SERIALIZED_NAME_COMMENT) private String comment; @@ -295,6 +299,29 @@ public void setCloudServiceProvider(String cloudServiceProvider) { } + public UpdateDBTarget clusterMode(Boolean clusterMode) { + + this.clusterMode = clusterMode; + return this; + } + + /** + * Cluster Mode + * @return clusterMode + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "Cluster Mode") + + public Boolean getClusterMode() { + return clusterMode; + } + + + public void setClusterMode(Boolean clusterMode) { + this.clusterMode = clusterMode; + } + + public UpdateDBTarget comment(String comment) { this.comment = comment; @@ -1045,6 +1072,7 @@ public boolean equals(Object o) { Objects.equals(this.azureClientSecret, updateDBTarget.azureClientSecret) && Objects.equals(this.azureTenantId, updateDBTarget.azureTenantId) && Objects.equals(this.cloudServiceProvider, updateDBTarget.cloudServiceProvider) && + Objects.equals(this.clusterMode, updateDBTarget.clusterMode) && Objects.equals(this.comment, updateDBTarget.comment) && Objects.equals(this.connectionType, updateDBTarget.connectionType) && Objects.equals(this.dbName, updateDBTarget.dbName) && @@ -1081,7 +1109,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(dbDefinedConnectionType, azureClientId, azureClientSecret, azureTenantId, cloudServiceProvider, comment, connectionType, dbName, dbServerCertificates, dbServerName, dbType, description, host, json, keepPrevVersion, key, maxVersions, mongodbAtlas, mongodbAtlasApiPrivateKey, mongodbAtlasApiPublicKey, mongodbAtlasProjectId, mongodbDefaultAuthDb, mongodbUriOptions, name, newName, oracleServiceName, port, pwd, snowflakeAccount, snowflakeApiPrivateKey, snowflakeApiPrivateKeyPassword, ssl, sslCertificate, token, uidToken, updateVersion, userName); + return Objects.hash(dbDefinedConnectionType, azureClientId, azureClientSecret, azureTenantId, cloudServiceProvider, clusterMode, comment, connectionType, dbName, dbServerCertificates, dbServerName, dbType, description, host, json, keepPrevVersion, key, maxVersions, mongodbAtlas, mongodbAtlasApiPrivateKey, mongodbAtlasApiPublicKey, mongodbAtlasProjectId, mongodbDefaultAuthDb, mongodbUriOptions, name, newName, oracleServiceName, port, pwd, snowflakeAccount, snowflakeApiPrivateKey, snowflakeApiPrivateKeyPassword, ssl, sslCertificate, token, uidToken, updateVersion, userName); } @Override @@ -1093,6 +1121,7 @@ public String toString() { sb.append(" azureClientSecret: ").append(toIndentedString(azureClientSecret)).append("\n"); sb.append(" azureTenantId: ").append(toIndentedString(azureTenantId)).append("\n"); sb.append(" cloudServiceProvider: ").append(toIndentedString(cloudServiceProvider)).append("\n"); + sb.append(" clusterMode: ").append(toIndentedString(clusterMode)).append("\n"); sb.append(" comment: ").append(toIndentedString(comment)).append("\n"); sb.append(" connectionType: ").append(toIndentedString(connectionType)).append("\n"); sb.append(" dbName: ").append(toIndentedString(dbName)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdateNativeK8STarget.java b/src/main/java/io/akeyless/client/model/UpdateNativeK8STarget.java index b35a6555..9cfd81e5 100644 --- a/src/main/java/io/akeyless/client/model/UpdateNativeK8STarget.java +++ b/src/main/java/io/akeyless/client/model/UpdateNativeK8STarget.java @@ -61,6 +61,10 @@ public class UpdateNativeK8STarget { @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_ENDPOINT) private String k8sClusterEndpoint = "dummy_val"; + public static final String SERIALIZED_NAME_K8S_CLUSTER_NAME = "k8s-cluster-name"; + @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_NAME) + private String k8sClusterName; + public static final String SERIALIZED_NAME_K8S_CLUSTER_TOKEN = "k8s-cluster-token"; @SerializedName(SERIALIZED_NAME_K8S_CLUSTER_TOKEN) private String k8sClusterToken = "dummy_val"; @@ -288,6 +292,29 @@ public void setK8sClusterEndpoint(String k8sClusterEndpoint) { } + public UpdateNativeK8STarget k8sClusterName(String k8sClusterName) { + + this.k8sClusterName = k8sClusterName; + return this; + } + + /** + * K8S cluster name + * @return k8sClusterName + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "K8S cluster name") + + public String getK8sClusterName() { + return k8sClusterName; + } + + + public void setK8sClusterName(String k8sClusterName) { + this.k8sClusterName = k8sClusterName; + } + + public UpdateNativeK8STarget k8sClusterToken(String k8sClusterToken) { this.k8sClusterToken = k8sClusterToken; @@ -535,6 +562,7 @@ public boolean equals(Object o) { Objects.equals(this.k8sClientKey, updateNativeK8STarget.k8sClientKey) && Objects.equals(this.k8sClusterCaCert, updateNativeK8STarget.k8sClusterCaCert) && Objects.equals(this.k8sClusterEndpoint, updateNativeK8STarget.k8sClusterEndpoint) && + Objects.equals(this.k8sClusterName, updateNativeK8STarget.k8sClusterName) && Objects.equals(this.k8sClusterToken, updateNativeK8STarget.k8sClusterToken) && Objects.equals(this.keepPrevVersion, updateNativeK8STarget.keepPrevVersion) && Objects.equals(this.key, updateNativeK8STarget.key) && @@ -549,7 +577,7 @@ public boolean equals(Object o) { @Override public int hashCode() { - return Objects.hash(comment, description, json, k8sAuthType, k8sClientCertificate, k8sClientKey, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterToken, keepPrevVersion, key, maxVersions, name, newName, token, uidToken, updateVersion, useGwServiceAccount); + return Objects.hash(comment, description, json, k8sAuthType, k8sClientCertificate, k8sClientKey, k8sClusterCaCert, k8sClusterEndpoint, k8sClusterName, k8sClusterToken, keepPrevVersion, key, maxVersions, name, newName, token, uidToken, updateVersion, useGwServiceAccount); } @Override @@ -564,6 +592,7 @@ public String toString() { sb.append(" k8sClientKey: ").append(toIndentedString(k8sClientKey)).append("\n"); sb.append(" k8sClusterCaCert: ").append(toIndentedString(k8sClusterCaCert)).append("\n"); sb.append(" k8sClusterEndpoint: ").append(toIndentedString(k8sClusterEndpoint)).append("\n"); + sb.append(" k8sClusterName: ").append(toIndentedString(k8sClusterName)).append("\n"); sb.append(" k8sClusterToken: ").append(toIndentedString(k8sClusterToken)).append("\n"); sb.append(" keepPrevVersion: ").append(toIndentedString(keepPrevVersion)).append("\n"); sb.append(" key: ").append(toIndentedString(key)).append("\n"); diff --git a/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java b/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java index 481cc44f..7e8a4fd1 100644 --- a/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java +++ b/src/main/java/io/akeyless/client/model/UpdatePKICertIssuer.java @@ -177,7 +177,7 @@ public class UpdatePKICertIssuer { public static final String SERIALIZED_NAME_TTL = "ttl"; @SerializedName(SERIALIZED_NAME_TTL) - private Long ttl; + private String ttl; public static final String SERIALIZED_NAME_UID_TOKEN = "uid-token"; @SerializedName(SERIALIZED_NAME_UID_TOKEN) @@ -1038,7 +1038,7 @@ public void setToken(String token) { } - public UpdatePKICertIssuer ttl(Long ttl) { + public UpdatePKICertIssuer ttl(String ttl) { this.ttl = ttl; return this; @@ -1051,12 +1051,12 @@ public UpdatePKICertIssuer ttl(Long ttl) { @javax.annotation.Nonnull @ApiModelProperty(required = true, value = "The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs") - public Long getTtl() { + public String getTtl() { return ttl; } - public void setTtl(Long ttl) { + public void setTtl(String ttl) { this.ttl = ttl; } diff --git a/src/main/java/io/akeyless/client/model/ValidateTokenOutput.java b/src/main/java/io/akeyless/client/model/ValidateTokenOutput.java index edd82e40..dbf406a0 100644 --- a/src/main/java/io/akeyless/client/model/ValidateTokenOutput.java +++ b/src/main/java/io/akeyless/client/model/ValidateTokenOutput.java @@ -37,10 +37,18 @@ public class ValidateTokenOutput { @SerializedName(SERIALIZED_NAME_IS_VALID) private Boolean isValid; + public static final String SERIALIZED_NAME_LAST_ROTATE = "last_rotate"; + @SerializedName(SERIALIZED_NAME_LAST_ROTATE) + private String lastRotate; + public static final String SERIALIZED_NAME_REASON = "reason"; @SerializedName(SERIALIZED_NAME_REASON) private String reason; + public static final String SERIALIZED_NAME_TTL = "ttl"; + @SerializedName(SERIALIZED_NAME_TTL) + private Integer ttl; + public ValidateTokenOutput() { } @@ -90,6 +98,29 @@ public void setIsValid(Boolean isValid) { } + public ValidateTokenOutput lastRotate(String lastRotate) { + + this.lastRotate = lastRotate; + return this; + } + + /** + * Get lastRotate + * @return lastRotate + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public String getLastRotate() { + return lastRotate; + } + + + public void setLastRotate(String lastRotate) { + this.lastRotate = lastRotate; + } + + public ValidateTokenOutput reason(String reason) { this.reason = reason; @@ -113,6 +144,29 @@ public void setReason(String reason) { } + public ValidateTokenOutput ttl(Integer ttl) { + + this.ttl = ttl; + return this; + } + + /** + * Get ttl + * @return ttl + **/ + @javax.annotation.Nullable + @ApiModelProperty(value = "") + + public Integer getTtl() { + return ttl; + } + + + public void setTtl(Integer ttl) { + this.ttl = ttl; + } + + @Override public boolean equals(Object o) { if (this == o) { @@ -124,12 +178,14 @@ public boolean equals(Object o) { ValidateTokenOutput validateTokenOutput = (ValidateTokenOutput) o; return Objects.equals(this.expiration, validateTokenOutput.expiration) && Objects.equals(this.isValid, validateTokenOutput.isValid) && - Objects.equals(this.reason, validateTokenOutput.reason); + Objects.equals(this.lastRotate, validateTokenOutput.lastRotate) && + Objects.equals(this.reason, validateTokenOutput.reason) && + Objects.equals(this.ttl, validateTokenOutput.ttl); } @Override public int hashCode() { - return Objects.hash(expiration, isValid, reason); + return Objects.hash(expiration, isValid, lastRotate, reason, ttl); } @Override @@ -138,7 +194,9 @@ public String toString() { sb.append("class ValidateTokenOutput {\n"); sb.append(" expiration: ").append(toIndentedString(expiration)).append("\n"); sb.append(" isValid: ").append(toIndentedString(isValid)).append("\n"); + sb.append(" lastRotate: ").append(toIndentedString(lastRotate)).append("\n"); sb.append(" reason: ").append(toIndentedString(reason)).append("\n"); + sb.append(" ttl: ").append(toIndentedString(ttl)).append("\n"); sb.append("}"); return sb.toString(); } diff --git a/src/test/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspaceTest.java b/src/test/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspaceTest.java new file mode 100644 index 00000000..17748b81 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/DynamicSecretCreateGoogleWorkspaceTest.java @@ -0,0 +1,181 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for DynamicSecretCreateGoogleWorkspace + */ +public class DynamicSecretCreateGoogleWorkspaceTest { + private final DynamicSecretCreateGoogleWorkspace model = new DynamicSecretCreateGoogleWorkspace(); + + /** + * Model tests for DynamicSecretCreateGoogleWorkspace + */ + @Test + public void testDynamicSecretCreateGoogleWorkspace() { + // TODO: test DynamicSecretCreateGoogleWorkspace + } + + /** + * Test the property 'accessMode' + */ + @Test + public void accessModeTest() { + // TODO: test accessMode + } + + /** + * Test the property 'adminName' + */ + @Test + public void adminNameTest() { + // TODO: test adminName + } + + /** + * Test the property 'deleteProtection' + */ + @Test + public void deleteProtectionTest() { + // TODO: test deleteProtection + } + + /** + * Test the property 'description' + */ + @Test + public void descriptionTest() { + // TODO: test description + } + + /** + * Test the property 'gcpKey' + */ + @Test + public void gcpKeyTest() { + // TODO: test gcpKey + } + + /** + * Test the property 'groupName' + */ + @Test + public void groupNameTest() { + // TODO: test groupName + } + + /** + * Test the property 'groupRoleType' + */ + @Test + public void groupRoleTypeTest() { + // TODO: test groupRoleType + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'name' + */ + @Test + public void nameTest() { + // TODO: test name + } + + /** + * Test the property 'producerEncryptionKeyName' + */ + @Test + public void producerEncryptionKeyNameTest() { + // TODO: test producerEncryptionKeyName + } + + /** + * Test the property 'roleName' + */ + @Test + public void roleNameTest() { + // TODO: test roleName + } + + /** + * Test the property 'roleScope' + */ + @Test + public void roleScopeTest() { + // TODO: test roleScope + } + + /** + * Test the property 'tags' + */ + @Test + public void tagsTest() { + // TODO: test tags + } + + /** + * Test the property 'targetName' + */ + @Test + public void targetNameTest() { + // TODO: test targetName + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + + /** + * Test the property 'userTtl' + */ + @Test + public void userTtlTest() { + // TODO: test userTtl + } + +} diff --git a/src/test/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspaceTest.java b/src/test/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspaceTest.java new file mode 100644 index 00000000..153dc4d9 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/DynamicSecretUpdateGoogleWorkspaceTest.java @@ -0,0 +1,189 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import java.util.ArrayList; +import java.util.List; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for DynamicSecretUpdateGoogleWorkspace + */ +public class DynamicSecretUpdateGoogleWorkspaceTest { + private final DynamicSecretUpdateGoogleWorkspace model = new DynamicSecretUpdateGoogleWorkspace(); + + /** + * Model tests for DynamicSecretUpdateGoogleWorkspace + */ + @Test + public void testDynamicSecretUpdateGoogleWorkspace() { + // TODO: test DynamicSecretUpdateGoogleWorkspace + } + + /** + * Test the property 'accessMode' + */ + @Test + public void accessModeTest() { + // TODO: test accessMode + } + + /** + * Test the property 'adminName' + */ + @Test + public void adminNameTest() { + // TODO: test adminName + } + + /** + * Test the property 'deleteProtection' + */ + @Test + public void deleteProtectionTest() { + // TODO: test deleteProtection + } + + /** + * Test the property 'description' + */ + @Test + public void descriptionTest() { + // TODO: test description + } + + /** + * Test the property 'gcpKey' + */ + @Test + public void gcpKeyTest() { + // TODO: test gcpKey + } + + /** + * Test the property 'groupName' + */ + @Test + public void groupNameTest() { + // TODO: test groupName + } + + /** + * Test the property 'groupRoleType' + */ + @Test + public void groupRoleTypeTest() { + // TODO: test groupRoleType + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'name' + */ + @Test + public void nameTest() { + // TODO: test name + } + + /** + * Test the property 'newName' + */ + @Test + public void newNameTest() { + // TODO: test newName + } + + /** + * Test the property 'producerEncryptionKeyName' + */ + @Test + public void producerEncryptionKeyNameTest() { + // TODO: test producerEncryptionKeyName + } + + /** + * Test the property 'roleName' + */ + @Test + public void roleNameTest() { + // TODO: test roleName + } + + /** + * Test the property 'roleScope' + */ + @Test + public void roleScopeTest() { + // TODO: test roleScope + } + + /** + * Test the property 'tags' + */ + @Test + public void tagsTest() { + // TODO: test tags + } + + /** + * Test the property 'targetName' + */ + @Test + public void targetNameTest() { + // TODO: test targetName + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + + /** + * Test the property 'userTtl' + */ + @Test + public void userTtlTest() { + // TODO: test userTtl + } + +} diff --git a/src/test/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutputTest.java b/src/test/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutputTest.java new file mode 100644 index 00000000..229cec3d --- /dev/null +++ b/src/test/java/io/akeyless/client/model/GatewayCreateProducerGoogleWorkspaceOutputTest.java @@ -0,0 +1,52 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.DSProducerDetails; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for GatewayCreateProducerGoogleWorkspaceOutput + */ +public class GatewayCreateProducerGoogleWorkspaceOutputTest { + private final GatewayCreateProducerGoogleWorkspaceOutput model = new GatewayCreateProducerGoogleWorkspaceOutput(); + + /** + * Model tests for GatewayCreateProducerGoogleWorkspaceOutput + */ + @Test + public void testGatewayCreateProducerGoogleWorkspaceOutput() { + // TODO: test GatewayCreateProducerGoogleWorkspaceOutput + } + + /** + * Test the property 'producerDetails' + */ + @Test + public void producerDetailsTest() { + // TODO: test producerDetails + } + +} diff --git a/src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutputTest.java b/src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutputTest.java new file mode 100644 index 00000000..2c00fa20 --- /dev/null +++ b/src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigOutputTest.java @@ -0,0 +1,68 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.akeyless.client.model.ConfigChange; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for GatewayPartialUpdateK8SAuthConfigOutput + */ +public class GatewayPartialUpdateK8SAuthConfigOutputTest { + private final GatewayPartialUpdateK8SAuthConfigOutput model = new GatewayPartialUpdateK8SAuthConfigOutput(); + + /** + * Model tests for GatewayPartialUpdateK8SAuthConfigOutput + */ + @Test + public void testGatewayPartialUpdateK8SAuthConfigOutput() { + // TODO: test GatewayPartialUpdateK8SAuthConfigOutput + } + + /** + * Test the property 'clusterId' + */ + @Test + public void clusterIdTest() { + // TODO: test clusterId + } + + /** + * Test the property 'partsChange' + */ + @Test + public void partsChangeTest() { + // TODO: test partsChange + } + + /** + * Test the property 'totalHash' + */ + @Test + public void totalHashTest() { + // TODO: test totalHash + } + +} diff --git a/src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigTest.java b/src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigTest.java new file mode 100644 index 00000000..686dfb2d --- /dev/null +++ b/src/test/java/io/akeyless/client/model/GatewayPartialUpdateK8SAuthConfigTest.java @@ -0,0 +1,211 @@ +/* + * Akeyless API + * The purpose of this application is to provide access to Akeyless API. + * + * The version of the OpenAPI document: 2.0 + * Contact: support@akeyless.io + * + * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). + * https://openapi-generator.tech + * Do not edit the class manually. + */ + + +package io.akeyless.client.model; + +import com.google.gson.TypeAdapter; +import com.google.gson.annotations.JsonAdapter; +import com.google.gson.annotations.SerializedName; +import com.google.gson.stream.JsonReader; +import com.google.gson.stream.JsonWriter; +import io.swagger.annotations.ApiModel; +import io.swagger.annotations.ApiModelProperty; +import java.io.IOException; +import org.junit.Assert; +import org.junit.Ignore; +import org.junit.Test; + + +/** + * Model tests for GatewayPartialUpdateK8SAuthConfig + */ +public class GatewayPartialUpdateK8SAuthConfigTest { + private final GatewayPartialUpdateK8SAuthConfig model = new GatewayPartialUpdateK8SAuthConfig(); + + /** + * Model tests for GatewayPartialUpdateK8SAuthConfig + */ + @Test + public void testGatewayPartialUpdateK8SAuthConfig() { + // TODO: test GatewayPartialUpdateK8SAuthConfig + } + + /** + * Test the property 'useDefaultIdentityBool' + */ + @Test + public void useDefaultIdentityBoolTest() { + // TODO: test useDefaultIdentityBool + } + + /** + * Test the property 'accessId' + */ + @Test + public void accessIdTest() { + // TODO: test accessId + } + + /** + * Test the property 'configEncryptionKeyName' + */ + @Test + public void configEncryptionKeyNameTest() { + // TODO: test configEncryptionKeyName + } + + /** + * Test the property 'disableIssuerValidation' + */ + @Test + public void disableIssuerValidationTest() { + // TODO: test disableIssuerValidation + } + + /** + * Test the property 'json' + */ + @Test + public void jsonTest() { + // TODO: test json + } + + /** + * Test the property 'k8sAuthType' + */ + @Test + public void k8sAuthTypeTest() { + // TODO: test k8sAuthType + } + + /** + * Test the property 'k8sCaCert' + */ + @Test + public void k8sCaCertTest() { + // TODO: test k8sCaCert + } + + /** + * Test the property 'k8sClientCertificate' + */ + @Test + public void k8sClientCertificateTest() { + // TODO: test k8sClientCertificate + } + + /** + * Test the property 'k8sClientKey' + */ + @Test + public void k8sClientKeyTest() { + // TODO: test k8sClientKey + } + + /** + * Test the property 'k8sHost' + */ + @Test + public void k8sHostTest() { + // TODO: test k8sHost + } + + /** + * Test the property 'k8sIssuer' + */ + @Test + public void k8sIssuerTest() { + // TODO: test k8sIssuer + } + + /** + * Test the property 'name' + */ + @Test + public void nameTest() { + // TODO: test name + } + + /** + * Test the property 'newName' + */ + @Test + public void newNameTest() { + // TODO: test newName + } + + /** + * Test the property 'rancherApiKey' + */ + @Test + public void rancherApiKeyTest() { + // TODO: test rancherApiKey + } + + /** + * Test the property 'rancherClusterId' + */ + @Test + public void rancherClusterIdTest() { + // TODO: test rancherClusterId + } + + /** + * Test the property 'signingKey' + */ + @Test + public void signingKeyTest() { + // TODO: test signingKey + } + + /** + * Test the property 'token' + */ + @Test + public void tokenTest() { + // TODO: test token + } + + /** + * Test the property 'tokenExp' + */ + @Test + public void tokenExpTest() { + // TODO: test tokenExp + } + + /** + * Test the property 'tokenReviewerJwt' + */ + @Test + public void tokenReviewerJwtTest() { + // TODO: test tokenReviewerJwt + } + + /** + * Test the property 'uidToken' + */ + @Test + public void uidTokenTest() { + // TODO: test uidToken + } + + /** + * Test the property 'useGwServiceAccount' + */ + @Test + public void useGwServiceAccountTest() { + // TODO: test useGwServiceAccount + } + +}