Skip to content

Commit f1e4792

Browse files
committed
"Release v5.0.20"
1 parent 6c5c186 commit f1e4792

23 files changed

Lines changed: 269 additions & 18 deletions

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ The purpose of this application is to provide access to Akeyless API.
44
This Python package is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
55

66
- API version: 3.0
7-
- Package version: 5.0.19
7+
- Package version: 5.0.20
88
- Build package: org.openapitools.codegen.languages.PythonClientCodegen
99
For more information, please visit [http://akeyless.io](http://akeyless.io)
1010

akeyless/__init__.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515

1616
from __future__ import absolute_import
1717

18-
__version__ = "5.0.19"
18+
__version__ = "5.0.20"
1919

2020
# import apis into sdk package
2121
from akeyless.api.v2_api import V2Api

akeyless/api_client.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ def __init__(self, configuration=None, header_name=None, header_value=None,
7979
self.default_headers[header_name] = header_value
8080
self.cookie = cookie
8181
# Set default User-Agent.
82-
self.user_agent = 'OpenAPI-Generator/5.0.19/python'
82+
self.user_agent = 'OpenAPI-Generator/5.0.20/python'
8383
self.client_side_validation = configuration.client_side_validation
8484

8585
def __enter__(self):

akeyless/configuration.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -326,7 +326,7 @@ def to_debug_report(self):
326326
"OS: {env}\n"\
327327
"Python Version: {pyversion}\n"\
328328
"Version of the API: 3.0\n"\
329-
"SDK Package Version: 5.0.19".\
329+
"SDK Package Version: 5.0.20".\
330330
format(env=sys.platform, pyversion=sys.version)
331331

332332
def get_host_settings(self):

akeyless/models/certificate_store.py

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,17 +37,19 @@ class CertificateStore(object):
3737
'certificate_pem': 'str',
3838
'common_name': 'str',
3939
'expiration_date': 'datetime',
40+
'expiration_events': 'list[CertificateExpirationEvent]',
4041
'name': 'str'
4142
}
4243

4344
attribute_map = {
4445
'certificate_pem': 'certificate_pem',
4546
'common_name': 'common_name',
4647
'expiration_date': 'expiration_date',
48+
'expiration_events': 'expiration_events',
4749
'name': 'name'
4850
}
4951

50-
def __init__(self, certificate_pem=None, common_name=None, expiration_date=None, name=None, local_vars_configuration=None): # noqa: E501
52+
def __init__(self, certificate_pem=None, common_name=None, expiration_date=None, expiration_events=None, name=None, local_vars_configuration=None): # noqa: E501
5153
"""CertificateStore - a model defined in OpenAPI""" # noqa: E501
5254
if local_vars_configuration is None:
5355
local_vars_configuration = Configuration()
@@ -56,6 +58,7 @@ def __init__(self, certificate_pem=None, common_name=None, expiration_date=None,
5658
self._certificate_pem = None
5759
self._common_name = None
5860
self._expiration_date = None
61+
self._expiration_events = None
5962
self._name = None
6063
self.discriminator = None
6164

@@ -65,6 +68,8 @@ def __init__(self, certificate_pem=None, common_name=None, expiration_date=None,
6568
self.common_name = common_name
6669
if expiration_date is not None:
6770
self.expiration_date = expiration_date
71+
if expiration_events is not None:
72+
self.expiration_events = expiration_events
6873
if name is not None:
6974
self.name = name
7075

@@ -131,6 +136,27 @@ def expiration_date(self, expiration_date):
131136

132137
self._expiration_date = expiration_date
133138

139+
@property
140+
def expiration_events(self):
141+
"""Gets the expiration_events of this CertificateStore. # noqa: E501
142+
143+
144+
:return: The expiration_events of this CertificateStore. # noqa: E501
145+
:rtype: list[CertificateExpirationEvent]
146+
"""
147+
return self._expiration_events
148+
149+
@expiration_events.setter
150+
def expiration_events(self, expiration_events):
151+
"""Sets the expiration_events of this CertificateStore.
152+
153+
154+
:param expiration_events: The expiration_events of this CertificateStore. # noqa: E501
155+
:type: list[CertificateExpirationEvent]
156+
"""
157+
158+
self._expiration_events = expiration_events
159+
134160
@property
135161
def name(self):
136162
"""Gets the name of this CertificateStore. # noqa: E501

akeyless/models/create_usc.py

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ class CreateUSC(object):
3838
'delete_protection': 'str',
3939
'description': 'str',
4040
'gcp_project_id': 'str',
41+
'gcp_sm_regions': 'str',
4142
'item_custom_fields': 'dict(str, str)',
4243
'json': 'bool',
4344
'k8s_namespace': 'str',
@@ -55,6 +56,7 @@ class CreateUSC(object):
5556
'delete_protection': 'delete_protection',
5657
'description': 'description',
5758
'gcp_project_id': 'gcp-project-id',
59+
'gcp_sm_regions': 'gcp-sm-regions',
5860
'item_custom_fields': 'item-custom-fields',
5961
'json': 'json',
6062
'k8s_namespace': 'k8s-namespace',
@@ -67,7 +69,7 @@ class CreateUSC(object):
6769
'use_prefix_as_filter': 'use-prefix-as-filter'
6870
}
6971

70-
def __init__(self, azure_kv_name=None, delete_protection=None, description=None, gcp_project_id=None, item_custom_fields=None, json=False, k8s_namespace=None, name=None, tags=None, target_to_associate=None, token=None, uid_token=None, usc_prefix=None, use_prefix_as_filter='false', local_vars_configuration=None): # noqa: E501
72+
def __init__(self, azure_kv_name=None, delete_protection=None, description=None, gcp_project_id=None, gcp_sm_regions=None, item_custom_fields=None, json=False, k8s_namespace=None, name=None, tags=None, target_to_associate=None, token=None, uid_token=None, usc_prefix=None, use_prefix_as_filter='false', local_vars_configuration=None): # noqa: E501
7173
"""CreateUSC - a model defined in OpenAPI""" # noqa: E501
7274
if local_vars_configuration is None:
7375
local_vars_configuration = Configuration()
@@ -77,6 +79,7 @@ def __init__(self, azure_kv_name=None, delete_protection=None, description=None,
7779
self._delete_protection = None
7880
self._description = None
7981
self._gcp_project_id = None
82+
self._gcp_sm_regions = None
8083
self._item_custom_fields = None
8184
self._json = None
8285
self._k8s_namespace = None
@@ -97,6 +100,8 @@ def __init__(self, azure_kv_name=None, delete_protection=None, description=None,
97100
self.description = description
98101
if gcp_project_id is not None:
99102
self.gcp_project_id = gcp_project_id
103+
if gcp_sm_regions is not None:
104+
self.gcp_sm_regions = gcp_sm_regions
100105
if item_custom_fields is not None:
101106
self.item_custom_fields = item_custom_fields
102107
if json is not None:
@@ -208,6 +213,29 @@ def gcp_project_id(self, gcp_project_id):
208213

209214
self._gcp_project_id = gcp_project_id
210215

216+
@property
217+
def gcp_sm_regions(self):
218+
"""Gets the gcp_sm_regions of this CreateUSC. # noqa: E501
219+
220+
GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. # noqa: E501
221+
222+
:return: The gcp_sm_regions of this CreateUSC. # noqa: E501
223+
:rtype: str
224+
"""
225+
return self._gcp_sm_regions
226+
227+
@gcp_sm_regions.setter
228+
def gcp_sm_regions(self, gcp_sm_regions):
229+
"""Sets the gcp_sm_regions of this CreateUSC.
230+
231+
GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. # noqa: E501
232+
233+
:param gcp_sm_regions: The gcp_sm_regions of this CreateUSC. # noqa: E501
234+
:type: str
235+
"""
236+
237+
self._gcp_sm_regions = gcp_sm_regions
238+
211239
@property
212240
def item_custom_fields(self):
213241
"""Gets the item_custom_fields of this CreateUSC. # noqa: E501

akeyless/models/gateway_update_tls_cert.py

Lines changed: 29 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ class GatewayUpdateTlsCert(object):
3535
"""
3636
openapi_types = {
3737
'cert_data': 'str',
38+
'expiration_event_in': 'list[str]',
3839
'json': 'bool',
3940
'key_data': 'str',
4041
'token': 'str',
@@ -43,19 +44,21 @@ class GatewayUpdateTlsCert(object):
4344

4445
attribute_map = {
4546
'cert_data': 'cert-data',
47+
'expiration_event_in': 'expiration-event-in',
4648
'json': 'json',
4749
'key_data': 'key-data',
4850
'token': 'token',
4951
'uid_token': 'uid-token'
5052
}
5153

52-
def __init__(self, cert_data=None, json=False, key_data=None, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501
54+
def __init__(self, cert_data=None, expiration_event_in=None, json=False, key_data=None, token=None, uid_token=None, local_vars_configuration=None): # noqa: E501
5355
"""GatewayUpdateTlsCert - a model defined in OpenAPI""" # noqa: E501
5456
if local_vars_configuration is None:
5557
local_vars_configuration = Configuration()
5658
self.local_vars_configuration = local_vars_configuration
5759

5860
self._cert_data = None
61+
self._expiration_event_in = None
5962
self._json = None
6063
self._key_data = None
6164
self._token = None
@@ -64,6 +67,8 @@ def __init__(self, cert_data=None, json=False, key_data=None, token=None, uid_to
6467

6568
if cert_data is not None:
6669
self.cert_data = cert_data
70+
if expiration_event_in is not None:
71+
self.expiration_event_in = expiration_event_in
6772
if json is not None:
6873
self.json = json
6974
if key_data is not None:
@@ -96,6 +101,29 @@ def cert_data(self, cert_data):
96101

97102
self._cert_data = cert_data
98103

104+
@property
105+
def expiration_event_in(self):
106+
"""Gets the expiration_event_in of this GatewayUpdateTlsCert. # noqa: E501
107+
108+
How many days before the expiration of the certificate would you like to be notified. # noqa: E501
109+
110+
:return: The expiration_event_in of this GatewayUpdateTlsCert. # noqa: E501
111+
:rtype: list[str]
112+
"""
113+
return self._expiration_event_in
114+
115+
@expiration_event_in.setter
116+
def expiration_event_in(self, expiration_event_in):
117+
"""Sets the expiration_event_in of this GatewayUpdateTlsCert.
118+
119+
How many days before the expiration of the certificate would you like to be notified. # noqa: E501
120+
121+
:param expiration_event_in: The expiration_event_in of this GatewayUpdateTlsCert. # noqa: E501
122+
:type: list[str]
123+
"""
124+
125+
self._expiration_event_in = expiration_event_in
126+
99127
@property
100128
def json(self):
101129
"""Gets the json of this GatewayUpdateTlsCert. # noqa: E501

akeyless/models/general_config_part.py

Lines changed: 79 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,9 @@ class GeneralConfigPart(object):
4747
'notify_on_status_change': 'bool',
4848
'tcp_port': 'str',
4949
'tls_cert': 'str',
50+
'tls_cert_common_name': 'str',
51+
'tls_cert_expiration_date': 'datetime',
52+
'tls_cert_expiration_events': 'list[CertificateExpirationEvent]',
5053
'tls_key': 'str'
5154
}
5255

@@ -64,10 +67,13 @@ class GeneralConfigPart(object):
6467
'notify_on_status_change': 'notify_on_status_change',
6568
'tcp_port': 'tcp_port',
6669
'tls_cert': 'tls_cert',
70+
'tls_cert_common_name': 'tls_cert_common_name',
71+
'tls_cert_expiration_date': 'tls_cert_expiration_date',
72+
'tls_cert_expiration_events': 'tls_cert_expiration_events',
6773
'tls_key': 'tls_key'
6874
}
6975

70-
def __init__(self, akeyless_url=None, api_token_ttl=None, display_name=None, enable_sni_proxy=None, enable_tls=None, enable_tls_configure=None, enable_tls_curl=None, enable_tls_hvp=None, gw_cluster_url=None, hvp_route_version=None, notify_on_status_change=None, tcp_port=None, tls_cert=None, tls_key=None, local_vars_configuration=None): # noqa: E501
76+
def __init__(self, akeyless_url=None, api_token_ttl=None, display_name=None, enable_sni_proxy=None, enable_tls=None, enable_tls_configure=None, enable_tls_curl=None, enable_tls_hvp=None, gw_cluster_url=None, hvp_route_version=None, notify_on_status_change=None, tcp_port=None, tls_cert=None, tls_cert_common_name=None, tls_cert_expiration_date=None, tls_cert_expiration_events=None, tls_key=None, local_vars_configuration=None): # noqa: E501
7177
"""GeneralConfigPart - a model defined in OpenAPI""" # noqa: E501
7278
if local_vars_configuration is None:
7379
local_vars_configuration = Configuration()
@@ -86,6 +92,9 @@ def __init__(self, akeyless_url=None, api_token_ttl=None, display_name=None, ena
8692
self._notify_on_status_change = None
8793
self._tcp_port = None
8894
self._tls_cert = None
95+
self._tls_cert_common_name = None
96+
self._tls_cert_expiration_date = None
97+
self._tls_cert_expiration_events = None
8998
self._tls_key = None
9099
self.discriminator = None
91100

@@ -115,6 +124,12 @@ def __init__(self, akeyless_url=None, api_token_ttl=None, display_name=None, ena
115124
self.tcp_port = tcp_port
116125
if tls_cert is not None:
117126
self.tls_cert = tls_cert
127+
if tls_cert_common_name is not None:
128+
self.tls_cert_common_name = tls_cert_common_name
129+
if tls_cert_expiration_date is not None:
130+
self.tls_cert_expiration_date = tls_cert_expiration_date
131+
if tls_cert_expiration_events is not None:
132+
self.tls_cert_expiration_events = tls_cert_expiration_events
118133
if tls_key is not None:
119134
self.tls_key = tls_key
120135

@@ -393,6 +408,69 @@ def tls_cert(self, tls_cert):
393408

394409
self._tls_cert = tls_cert
395410

411+
@property
412+
def tls_cert_common_name(self):
413+
"""Gets the tls_cert_common_name of this GeneralConfigPart. # noqa: E501
414+
415+
416+
:return: The tls_cert_common_name of this GeneralConfigPart. # noqa: E501
417+
:rtype: str
418+
"""
419+
return self._tls_cert_common_name
420+
421+
@tls_cert_common_name.setter
422+
def tls_cert_common_name(self, tls_cert_common_name):
423+
"""Sets the tls_cert_common_name of this GeneralConfigPart.
424+
425+
426+
:param tls_cert_common_name: The tls_cert_common_name of this GeneralConfigPart. # noqa: E501
427+
:type: str
428+
"""
429+
430+
self._tls_cert_common_name = tls_cert_common_name
431+
432+
@property
433+
def tls_cert_expiration_date(self):
434+
"""Gets the tls_cert_expiration_date of this GeneralConfigPart. # noqa: E501
435+
436+
437+
:return: The tls_cert_expiration_date of this GeneralConfigPart. # noqa: E501
438+
:rtype: datetime
439+
"""
440+
return self._tls_cert_expiration_date
441+
442+
@tls_cert_expiration_date.setter
443+
def tls_cert_expiration_date(self, tls_cert_expiration_date):
444+
"""Sets the tls_cert_expiration_date of this GeneralConfigPart.
445+
446+
447+
:param tls_cert_expiration_date: The tls_cert_expiration_date of this GeneralConfigPart. # noqa: E501
448+
:type: datetime
449+
"""
450+
451+
self._tls_cert_expiration_date = tls_cert_expiration_date
452+
453+
@property
454+
def tls_cert_expiration_events(self):
455+
"""Gets the tls_cert_expiration_events of this GeneralConfigPart. # noqa: E501
456+
457+
458+
:return: The tls_cert_expiration_events of this GeneralConfigPart. # noqa: E501
459+
:rtype: list[CertificateExpirationEvent]
460+
"""
461+
return self._tls_cert_expiration_events
462+
463+
@tls_cert_expiration_events.setter
464+
def tls_cert_expiration_events(self, tls_cert_expiration_events):
465+
"""Sets the tls_cert_expiration_events of this GeneralConfigPart.
466+
467+
468+
:param tls_cert_expiration_events: The tls_cert_expiration_events of this GeneralConfigPart. # noqa: E501
469+
:type: list[CertificateExpirationEvent]
470+
"""
471+
472+
self._tls_cert_expiration_events = tls_cert_expiration_events
473+
396474
@property
397475
def tls_key(self):
398476
"""Gets the tls_key of this GeneralConfigPart. # noqa: E501

akeyless/models/get_kube_exec_creds.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ def csr_data_base64(self, csr_data_base64):
238238
def extended_key_usage(self):
239239
"""Gets the extended_key_usage of this GetKubeExecCreds. # noqa: E501
240240
241-
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501
241+
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical # noqa: E501
242242
243243
:return: The extended_key_usage of this GetKubeExecCreds. # noqa: E501
244244
:rtype: str
@@ -249,7 +249,7 @@ def extended_key_usage(self):
249249
def extended_key_usage(self, extended_key_usage):
250250
"""Sets the extended_key_usage of this GetKubeExecCreds.
251251
252-
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501
252+
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical # noqa: E501
253253
254254
:param extended_key_usage: The extended_key_usage of this GetKubeExecCreds. # noqa: E501
255255
:type: str

akeyless/models/get_pki_certificate.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ def csr_data_base64(self, csr_data_base64):
210210
def extended_key_usage(self):
211211
"""Gets the extended_key_usage of this GetPKICertificate. # noqa: E501
212212
213-
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501
213+
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical # noqa: E501
214214
215215
:return: The extended_key_usage of this GetPKICertificate. # noqa: E501
216216
:rtype: str
@@ -221,7 +221,7 @@ def extended_key_usage(self):
221221
def extended_key_usage(self, extended_key_usage):
222222
"""Sets the extended_key_usage of this GetPKICertificate.
223223
224-
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical # noqa: E501
224+
A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical # noqa: E501
225225
226226
:param extended_key_usage: The extended_key_usage of this GetPKICertificate. # noqa: E501
227227
:type: str

0 commit comments

Comments
 (0)