Skip to content

Commit 1fe6c90

Browse files
committed
Release v4.2.0
1 parent 0778f6c commit 1fe6c90

File tree

481 files changed

+94333
-15742
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

481 files changed

+94333
-15742
lines changed

.openapi-generator/FILES

Lines changed: 282 additions & 25 deletions
Large diffs are not rendered by default.

README.md

Lines changed: 180 additions & 1 deletion
Large diffs are not rendered by default.

akeyless.sln

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Microsoft Visual Studio Solution File, Format Version 12.00
22
# Visual Studio 2012
33
VisualStudioVersion = 12.0.0.0
44
MinimumVisualStudioVersion = 10.0.0.1
5-
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless", "src\akeyless\akeyless.csproj", "{69EA1EB8-EBD4-4794-B328-EF8F001FED57}"
5+
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless", "src\akeyless\akeyless.csproj", "{3BF69B8A-C607-414C-B60A-FF63D1861071}"
66
EndProject
77
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "akeyless.Test", "src\akeyless.Test\akeyless.Test.csproj", "{19F1DEBC-DE5E-4517-8062-F000CD499087}"
88
EndProject
@@ -12,10 +12,10 @@ Global
1212
Release|Any CPU = Release|Any CPU
1313
EndGlobalSection
1414
GlobalSection(ProjectConfigurationPlatforms) = postSolution
15-
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
16-
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Debug|Any CPU.Build.0 = Debug|Any CPU
17-
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Release|Any CPU.ActiveCfg = Release|Any CPU
18-
{69EA1EB8-EBD4-4794-B328-EF8F001FED57}.Release|Any CPU.Build.0 = Release|Any CPU
15+
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
16+
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Debug|Any CPU.Build.0 = Debug|Any CPU
17+
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Release|Any CPU.ActiveCfg = Release|Any CPU
18+
{3BF69B8A-C607-414C-B60A-FF63D1861071}.Release|Any CPU.Build.0 = Release|Any CPU
1919
{19F1DEBC-DE5E-4517-8062-F000CD499087}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
2020
{19F1DEBC-DE5E-4517-8062-F000CD499087}.Debug|Any CPU.Build.0 = Debug|Any CPU
2121
{19F1DEBC-DE5E-4517-8062-F000CD499087}.Release|Any CPU.ActiveCfg = Release|Any CPU

docs/AccountGeneralSettings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ Name | Type | Description | Notes
77
------------ | ------------- | ------------- | -------------
88
**AccountDefaultKeyItemId** | **long** | AccountDefaultKeyItemID is the item ID of the DFC key item configured as the default protection key | [optional]
99
**AccountDefaultKeyName** | **string** | AccountDefaultKeyName is the name of the DFC key item configured as the default key This is here simply for the response to include the item name in addition to the display ID so the client can properly show this to the user. It will not be saved to the DB, only the AccountDefaultKeyItemID will. | [optional]
10+
**AllowedClientsIps** | [**AllowedIpSettings**](AllowedIpSettings.md) | | [optional]
11+
**AllowedGatewaysIps** | [**AllowedIpSettings**](AllowedIpSettings.md) | | [optional]
1012
**AuthUsageEvent** | [**UsageEventSetting**](UsageEventSetting.md) | | [optional]
1113
**DataProtectionSection** | [**DataProtectionSection**](DataProtectionSection.md) | | [optional]
1214
**DynamicSecretMaxTtl** | [**DynamicSecretMaxTtl**](DynamicSecretMaxTtl.md) | | [optional]

docs/AllowedIpSettings.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# akeyless.Model.AllowedIpSettings
2+
3+
## Properties
4+
5+
Name | Type | Description | Notes
6+
------------ | ------------- | ------------- | -------------
7+
**CidrWhitelist** | **string** | | [optional]
8+
**Lock** | **bool** | | [optional]
9+
10+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
11+

docs/AuthMethodAccessInfo.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ Name | Type | Description | Notes
77
**AccessExpires** | **long** | | [optional]
88
**AccessIdAlias** | **string** | for accounts where AccessId holds encrypted email this field will hold generated AccessId, for accounts based on regular AccessId it will be equal to accessId itself | [optional]
99
**ApiKeyAccessRules** | [**APIKeyAccessRules**](APIKeyAccessRules.md) | | [optional]
10+
**AuditLogsClaims** | **List<string>** | | [optional]
1011
**AwsIamAccessRules** | [**AWSIAMAccessRules**](AWSIAMAccessRules.md) | | [optional]
1112
**AzureAdAccessRules** | [**AzureADAccessRules**](AzureADAccessRules.md) | | [optional]
1213
**CertAccessRules** | [**CertAccessRules**](CertAccessRules.md) | | [optional]

docs/AuthMethodCreateApiKey.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
# akeyless.Model.AuthMethodCreateApiKey
2+
authMethodCreateApiKey is a command that creates Api Key auth method
3+
4+
## Properties
5+
6+
Name | Type | Description | Notes
7+
------------ | ------------- | ------------- | -------------
8+
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
9+
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
10+
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
11+
**Description** | **string** | Auth Method description | [optional]
12+
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
13+
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
14+
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
15+
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
16+
**Name** | **string** | Auth Method name |
17+
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
18+
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
19+
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
20+
21+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
22+

docs/AuthMethodCreateAwsIam.md

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
# akeyless.Model.AuthMethodCreateAwsIam
2+
authMethodCreateAwsIam is a command that creates a new Auth Method that will be able to authenticate using AWS IAM credentials.
3+
4+
## Properties
5+
6+
Name | Type | Description | Notes
7+
------------ | ------------- | ------------- | -------------
8+
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
9+
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
10+
**BoundArn** | **List<string>** | A list of full arns that the access is restricted to | [optional]
11+
**BoundAwsAccountId** | **List<string>** | A list of AWS account-IDs that the access is restricted to |
12+
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
13+
**BoundResourceId** | **List<string>** | A list of full resource ids that the access is restricted to | [optional]
14+
**BoundRoleId** | **List<string>** | A list of full role ids that the access is restricted to | [optional]
15+
**BoundRoleName** | **List<string>** | A list of full role-name that the access is restricted to | [optional]
16+
**BoundUserId** | **List<string>** | A list of full user ids that the access is restricted to | [optional]
17+
**BoundUserName** | **List<string>** | A list of full user-name that the access is restricted to | [optional]
18+
**Description** | **string** | Auth Method description | [optional]
19+
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
20+
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
21+
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
22+
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
23+
**Name** | **string** | Auth Method name |
24+
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
25+
**StsUrl** | **string** | sts URL | [optional] [default to "https://sts.amazonaws.com"]
26+
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
27+
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
28+
29+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
30+

docs/AuthMethodCreateAzureAD.md

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
# akeyless.Model.AuthMethodCreateAzureAD
2+
authMethodCreateAzureAD is a command that creates a new auth method that will be able to authenticate using Azure Active Directory credentials.
3+
4+
## Properties
5+
6+
Name | Type | Description | Notes
7+
------------ | ------------- | ------------- | -------------
8+
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
9+
**Audience** | **string** | Deprecated (Deprecated) The audience in the JWT | [optional] [default to "https://management.azure.com/"]
10+
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
11+
**BoundGroupId** | **List<string>** | A list of group ids that the access is restricted to | [optional]
12+
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
13+
**BoundProviders** | **List<string>** | A list of resource providers that the access is restricted to (e.g, Microsoft.Compute, Microsoft.ManagedIdentity, etc) | [optional]
14+
**BoundResourceId** | **List<string>** | A list of full resource ids that the access is restricted to | [optional]
15+
**BoundResourceNames** | **List<string>** | A list of resource names that the access is restricted to (e.g, a virtual machine name, scale set name, etc). | [optional]
16+
**BoundResourceTypes** | **List<string>** | A list of resource types that the access is restricted to (e.g, virtualMachines, userAssignedIdentities, etc) | [optional]
17+
**BoundRgId** | **List<string>** | A list of resource groups that the access is restricted to | [optional]
18+
**BoundSpid** | **List<string>** | A list of service principal IDs that the access is restricted to | [optional]
19+
**BoundSubId** | **List<string>** | A list of subscription ids that the access is restricted to | [optional]
20+
**BoundTenantId** | **string** | The Azure tenant id that the access is restricted to |
21+
**Description** | **string** | Auth Method description | [optional]
22+
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
23+
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
24+
**Issuer** | **string** | Issuer URL | [optional] [default to "https://sts.windows.net/---bound_tenant_id---"]
25+
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
26+
**JwksUri** | **string** | The URL to the JSON Web Key Set (JWKS) that containing the public keys that should be used to verify any JSON Web Token (JWT) issued by the authorization server. | [optional] [default to "https://login.microsoftonline.com/common/discovery/keys"]
27+
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
28+
**Name** | **string** | Auth Method name |
29+
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
30+
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
31+
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
32+
33+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
34+

docs/AuthMethodCreateCert.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# akeyless.Model.AuthMethodCreateCert
2+
authMethodCreateCert is a command that creates a new auth method that will be able to authenticate using a client certificate
3+
4+
## Properties
5+
6+
Name | Type | Description | Notes
7+
------------ | ------------- | ------------- | -------------
8+
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
9+
**AllowedCors** | **string** | Comma separated list of allowed CORS domains to be validated as part of the authentication flow. | [optional]
10+
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
11+
**BoundCommonNames** | **List<string>** | A list of names. At least one must exist in the Common Name. Supports globbing. | [optional]
12+
**BoundDnsSans** | **List<string>** | A list of DNS names. At least one must exist in the SANs. Supports globbing. | [optional]
13+
**BoundEmailSans** | **List<string>** | A list of Email Addresses. At least one must exist in the SANs. Supports globbing. | [optional]
14+
**BoundExtensions** | **List<string>** | A list of extensions formatted as \"oid:value\". Expects the extension value to be some type of ASN1 encoded string. All values much match. Supports globbing on \"value\". | [optional]
15+
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
16+
**BoundOrganizationalUnits** | **List<string>** | A list of Organizational Units names. At least one must exist in the OU field. | [optional]
17+
**BoundUriSans** | **List<string>** | A list of URIs. At least one must exist in the SANs. Supports globbing. | [optional]
18+
**CertificateData** | **string** | The certificate data in base64, if no file was provided | [optional]
19+
**Description** | **string** | Auth Method description | [optional]
20+
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
21+
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
22+
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
23+
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
24+
**Name** | **string** | Auth Method name |
25+
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
26+
**RevokedCertIds** | **List<string>** | A list of revoked cert ids | [optional]
27+
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
28+
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
29+
**UniqueIdentifier** | **string** | A unique identifier (ID) value should be configured, such as common_name or organizational_unit Whenever a user logs in with a token, these authentication types issue a \"sub claim\" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. |
30+
31+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
32+

docs/AuthMethodCreateEmail.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
# akeyless.Model.AuthMethodCreateEmail
2+
authMethodCreateEmail is a command that creates a new auth method that will be able to authenticate using email.
3+
4+
## Properties
5+
6+
Name | Type | Description | Notes
7+
------------ | ------------- | ------------- | -------------
8+
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
9+
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
10+
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
11+
**Description** | **string** | Auth Method description | [optional]
12+
**Email** | **string** | An email address to be invited to have access |
13+
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
14+
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
15+
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
16+
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
17+
**Name** | **string** | Auth Method name |
18+
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
19+
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
20+
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
21+
22+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
23+

docs/AuthMethodCreateGcp.md

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
# akeyless.Model.AuthMethodCreateGcp
2+
authMethodCreateGcp is a command that creates a new auth method that will be able to authenticate using GCP IAM Service Account credentials or GCE instance credentials.
3+
4+
## Properties
5+
6+
Name | Type | Description | Notes
7+
------------ | ------------- | ------------- | -------------
8+
**AccessExpires** | **long** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional] [default to 0]
9+
**Audience** | **string** | The audience to verify in the JWT received by the client | [default to "akeyless.io"]
10+
**AuditLogsClaims** | **List<string>** | Subclaims to include in audit logs, e.g \"- -audit-logs-claims email - -audit-logs-claims username\" | [optional]
11+
**BoundIps** | **List<string>** | A CIDR whitelist with the IPs that the access is restricted to | [optional]
12+
**BoundLabels** | **List<string>** | A comma-separated list of GCP labels formatted as \"key:value\" strings that must be set on authorized GCE instances. TODO: Because GCP labels are not currently ACL'd .... | [optional]
13+
**BoundProjects** | **List<string>** | === Human and Machine authentication section === Array of GCP project IDs. Only entities belonging to any of the provided projects can authenticate. | [optional]
14+
**BoundRegions** | **List<string>** | List of regions that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a regional group and the group must belong to this region. If bound_zones are provided, this attribute is ignored. | [optional]
15+
**BoundServiceAccounts** | **List<string>** | List of service accounts the service account must be part of in order to be authenticated. | [optional]
16+
**BoundZones** | **List<string>** | === Machine authentication section === List of zones that a GCE instance must belong to in order to be authenticated. TODO: If bound_instance_groups is provided, it is assumed to be a zonal group and the group must belong to this zone. | [optional]
17+
**Description** | **string** | Auth Method description | [optional]
18+
**ForceSubClaims** | **bool** | if true: enforce role-association must include sub claims | [optional]
19+
**GwBoundIps** | **List<string>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional]
20+
**Json** | **bool** | Set output format to JSON | [optional] [default to false]
21+
**JwtTtl** | **long** | Jwt TTL | [optional] [default to 0]
22+
**Name** | **string** | Auth Method name |
23+
**ProductType** | **List<string>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional]
24+
**ServiceAccountCredsData** | **string** | ServiceAccount credentials data instead of giving a file path, base64 encoded | [optional]
25+
**Token** | **string** | Authentication token (see `/auth` and `/configure`) | [optional]
26+
**Type** | **string** | Type of the GCP Access Rules |
27+
**UidToken** | **string** | The universal identity token, Required only for universal_identity authentication | [optional]
28+
29+
[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)
30+

0 commit comments

Comments
 (0)