Skip to content

Commit

Permalink
Release v4.2.0
Browse files Browse the repository at this point in the history
  • Loading branch information
akeyless-ci committed Jul 4, 2024
1 parent 0778f6c commit 1fe6c90
Show file tree
Hide file tree
Showing 481 changed files with 94,333 additions and 15,742 deletions.
307 changes: 282 additions & 25 deletions .openapi-generator/FILES

Large diffs are not rendered by default.

181 changes: 180 additions & 1 deletion README.md

Large diffs are not rendered by default.

10 changes: 5 additions & 5 deletions akeyless.sln
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio 2012
VisualStudioVersion = 12.0.0.0
MinimumVisualStudioVersion = 10.0.0.1
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless", "src\akeyless\akeyless.csproj", "{69EA1EB8-EBD4-4794-B328-EF8F001FED57}"
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless", "src\akeyless\akeyless.csproj", "{3BF69B8A-C607-414C-B60A-FF63D1861071}"
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless.Test", "src\akeyless.Test\akeyless.Test.csproj", "{19F1DEBC-DE5E-4517-8062-F000CD499087}"
EndProject
Expand All @@ -12,10 +12,10 @@ Global
Release|Any CPU = Release|Any CPU
EndGlobalSection
GlobalSection(ProjectConfigurationPlatforms) = postSolution
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Debug|Any CPU.Build.0 = Debug|Any CPU
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Release|Any CPU.ActiveCfg = Release|Any CPU
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Release|Any CPU.Build.0 = Release|Any CPU
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Debug|Any CPU.Build.0 = Debug|Any CPU
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Release|Any CPU.ActiveCfg = Release|Any CPU
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Release|Any CPU.Build.0 = Release|Any CPU
{19F1DEBC-DE5E-4517-8062-F000CD499087}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
{19F1DEBC-DE5E-4517-8062-F000CD499087}.Debug|Any CPU.Build.0 = Debug|Any CPU
{19F1DEBC-DE5E-4517-8062-F000CD499087}.Release|Any CPU.ActiveCfg = Release|Any CPU
Expand Down
2 changes: 2 additions & 0 deletions docs/AccountGeneralSettings.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,8 @@ Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccountDefaultKeyItemId** | **long** | AccountDefaultKeyItemID is the item ID of the DFC key item configured as the default protection key | [optional]
**AccountDefaultKeyName** | **string** | AccountDefaultKeyName is the name of the DFC key item configured as the default key This is here simply for the response to include the item name in addition to the display ID so the client can properly show this to the user. It will not be saved to the DB, only the AccountDefaultKeyItemID will. | [optional]
**AllowedClientsIps** | [**AllowedIpSettings**](AllowedIpSettings.md) | | [optional]
**AllowedGatewaysIps** | [**AllowedIpSettings**](AllowedIpSettings.md) | | [optional]
**AuthUsageEvent** | [**UsageEventSetting**](UsageEventSetting.md) | | [optional]
**DataProtectionSection** | [**DataProtectionSection**](DataProtectionSection.md) | | [optional]
**DynamicSecretMaxTtl** | [**DynamicSecretMaxTtl**](DynamicSecretMaxTtl.md) | | [optional]
Expand Down
11 changes: 11 additions & 0 deletions docs/AllowedIpSettings.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
# akeyless.Model.AllowedIpSettings

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**CidrWhitelist** | **string** | | [optional]
**Lock** | **bool** | | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

1 change: 1 addition & 0 deletions docs/AuthMethodAccessInfo.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ Name | Type | Description | Notes
**AccessExpires** | **long** | | [optional]
**AccessIdAlias** | **string** | for accounts where AccessId holds encrypted email this field will hold generated AccessId, for accounts based on regular AccessId it will be equal to accessId itself | [optional]
**ApiKeyAccessRules** | [**APIKeyAccessRules**](APIKeyAccessRules.md) | | [optional]
**AuditLogsClaims** | **List<string>** | | [optional]
**AwsIamAccessRules** | [**AWSIAMAccessRules**](AWSIAMAccessRules.md) | | [optional]
**AzureAdAccessRules** | [**AzureADAccessRules**](AzureADAccessRules.md) | | [optional]
**CertAccessRules** | [**CertAccessRules**](CertAccessRules.md) | | [optional]
Expand Down
22 changes: 22 additions & 0 deletions docs/AuthMethodCreateApiKey.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# akeyless.Model.AuthMethodCreateApiKey
authMethodCreateApiKey is a command that creates Api Key auth method

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
**Description** | **string** | Auth Method description | [optional]
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
**Name** | **string** | Auth Method name |
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

30 changes: 30 additions & 0 deletions docs/AuthMethodCreateAwsIam.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# akeyless.Model.AuthMethodCreateAwsIam
authMethodCreateAwsIam is a command that creates a new Auth Method that will be able to authenticate using AWS IAM credentials.

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
**BoundArn** | **List<string>** | A list of full arns that the access is restricted to | [optional]
**BoundAwsAccountId** | **List<string>** | A list of AWS account-IDs that the access is restricted to |
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
**BoundResourceId** | **List<string>** | A list of full resource ids that the access is restricted to | [optional]
**BoundRoleId** | **List<string>** | A list of full role ids that the access is restricted to | [optional]
**BoundRoleName** | **List<string>** | A list of full role-name that the access is restricted to | [optional]
**BoundUserId** | **List<string>** | A list of full user ids that the access is restricted to | [optional]
**BoundUserName** | **List<string>** | A list of full user-name that the access is restricted to | [optional]
**Description** | **string** | Auth Method description | [optional]
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
**Name** | **string** | Auth Method name |
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
**StsUrl** | **string** | sts URL | [optional] [default to "https://sts.amazonaws.com"]
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

34 changes: 34 additions & 0 deletions docs/AuthMethodCreateAzureAD.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
# akeyless.Model.AuthMethodCreateAzureAD
authMethodCreateAzureAD is a command that creates a new auth method that will be able to authenticate using Azure Active Directory credentials.

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
**Audience** | **string** | Deprecated (Deprecated) The audience in the JWT | [optional] [default to "https://management.azure.com/"]
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
**BoundGroupId** | **List<string>** | A list of group ids that the access is restricted to | [optional]
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
**BoundProviders** | **List<string>** | A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc) | [optional]
**BoundResourceId** | **List<string>** | A list of full resource ids that the access is restricted to | [optional]
**BoundResourceNames** | **List<string>** | A list of resource names that the access is restricted to (e.g, a virtual machine name, scale set name, etc). | [optional]
**BoundResourceTypes** | **List<string>** | A list of resource types that the access is restricted to (e.g, virtualMachines, userAssignedIdentities, etc) | [optional]
**BoundRgId** | **List<string>** | A list of resource groups that the access is restricted to | [optional]
**BoundSpid** | **List<string>** | A list of service principal IDs that the access is restricted to | [optional]
**BoundSubId** | **List<string>** | A list of subscription ids that the access is restricted to | [optional]
**BoundTenantId** | **string** | The Azure tenant id that the access is restricted to |
**Description** | **string** | Auth Method description | [optional]
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
**Issuer** | **string** | Issuer URL | [optional] [default to "https://sts.windows.net/---bound_tenant_id---"]
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
**JwksUri** | **string** | The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server. | [optional] [default to "https://login.microsoftonline.com/common/discovery/keys"]
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
**Name** | **string** | Auth Method name |
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

32 changes: 32 additions & 0 deletions docs/AuthMethodCreateCert.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# akeyless.Model.AuthMethodCreateCert
authMethodCreateCert is a command that creates a new auth method that will be able to authenticate using a client certificate

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
**AllowedCors** | **string** | Comma separated list of allowed CORS domains to be validated as part of the authentication flow. | [optional]
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
**BoundCommonNames** | **List<string>** | A list of names. At least one must exist in the Common Name. Supports globbing. | [optional]
**BoundDnsSans** | **List<string>** | A list of DNS names. At least one must exist in the SANs. Supports globbing. | [optional]
**BoundEmailSans** | **List<string>** | A list of Email Addresses. At least one must exist in the SANs. Supports globbing. | [optional]
**BoundExtensions** | **List<string>** | A list of extensions formatted as \"oid:value\". Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on \"value\". | [optional]
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
**BoundOrganizationalUnits** | **List<string>** | A list of Organizational Units names. At least one must exist in the OU field. | [optional]
**BoundUriSans** | **List<string>** | A list of URIs. At least one must exist in the SANs. Supports globbing. | [optional]
**CertificateData** | **string** | The certificate data in base64, if no file was provided | [optional]
**Description** | **string** | Auth Method description | [optional]
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
**Name** | **string** | Auth Method name |
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
**RevokedCertIds** | **List<string>** | A list of revoked cert ids | [optional]
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
**UniqueIdentifier** | **string** | A unique identifier (ID) value should be configured, such as common_name or organizational_unit Whenever a user logs in with a token, these authentication types issue a \"sub claim\" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. |

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

23 changes: 23 additions & 0 deletions docs/AuthMethodCreateEmail.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
# akeyless.Model.AuthMethodCreateEmail
authMethodCreateEmail is a command that creates a new auth method that will be able to authenticate using email.

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
**Description** | **string** | Auth Method description | [optional]
**Email** | **string** | An email address to be invited to have access |
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
**Name** | **string** | Auth Method name |
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

30 changes: 30 additions & 0 deletions docs/AuthMethodCreateGcp.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
# akeyless.Model.AuthMethodCreateGcp
authMethodCreateGcp is a command that creates a new auth method that will be able to authenticate using GCP IAM Service Account credentials or GCE instance credentials.

## Properties

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
**Audience** | **string** | The audience to verify in the JWT received by the client | [default to "akeyless.io"]
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
**BoundLabels** | **List<string>** | A comma-separated list of GCP labels formatted as \"key:value\" strings that must be set on authorized GCE instances. TODO: Because GCP labels are not currently ACL'd .... | [optional]
**BoundProjects** | **List<string>** | === Human and Machine authentication section === Array of GCP project IDs. Only entities belonging to any of the provided projects can authenticate. | [optional]
**BoundRegions** | **List<string>** | List of regions that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored. | [optional]
**BoundServiceAccounts** | **List<string>** | List of service accounts the service account must be part of in order to be authenticated. | [optional]
**BoundZones** | **List<string>** | === Machine authentication section === List of zones that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone. | [optional]
**Description** | **string** | Auth Method description | [optional]
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
**Name** | **string** | Auth Method name |
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
**ServiceAccountCredsData** | **string** | ServiceAccount credentials data instead of giving a file path, base64 encoded | [optional]
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
**Type** | **string** | Type of the GCP Access Rules |
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)

Loading

0 comments on commit 1fe6c90

Please sign in to comment.