Skip to content

Commit

Permalink
Fix types for duration responses
Browse files Browse the repository at this point in the history
  • Loading branch information
WqyJh committed Dec 17, 2024
1 parent 833e831 commit cd7bc62
Show file tree
Hide file tree
Showing 19 changed files with 62 additions and 62 deletions.
2 changes: 1 addition & 1 deletion docs/AppRoleLookUpSecretIdByAccessorResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Name | Type | Description | Notes
**Metadata** | Pointer to **map[string]interface{}** | | [optional]
**SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional]
**SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional]
**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional]
**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional]
**TokenBoundCidrs** | Pointer to **[]string** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional]


Expand Down
2 changes: 1 addition & 1 deletion docs/AppRoleLookUpSecretIdResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Name | Type | Description | Notes
**Metadata** | Pointer to **map[string]interface{}** | | [optional]
**SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional]
**SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional]
**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional]
**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional]
**TokenBoundCidrs** | Pointer to **[]string** | List of CIDR blocks. If set, specifies the blocks of IP addresses which can use the returned token. Should be a subset of the token CIDR blocks listed on the role, if any. | [optional]


Expand Down
4 changes: 2 additions & 2 deletions docs/AppRoleReadPeriodResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,8 @@

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**Period** | Pointer to **string** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional]
**TokenPeriod** | Pointer to **string** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\"). | [optional]
**Period** | Pointer to **int64** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional]
**TokenPeriod** | Pointer to **int64** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds. | [optional]



Expand Down
12 changes: 6 additions & 6 deletions docs/AppRoleReadRoleResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,19 +7,19 @@ Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**BindSecretId** | Pointer to **bool** | Impose secret ID to be presented when logging in using this role. | [optional]
**LocalSecretIds** | Pointer to **bool** | If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later | [optional]
**Period** | Pointer to **string** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional]
**Period** | Pointer to **int64** | Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used. | [optional]
**Policies** | Pointer to **[]string** | Use \"token_policies\" instead. If this and \"token_policies\" are both specified, only \"token_policies\" will be used. | [optional]
**SecretIdBoundCidrs** | Pointer to **[]string** | Comma separated string or list of CIDR blocks. If set, specifies the blocks of IP addresses which can perform the login operation. | [optional]
**SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional]
**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional]
**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional]
**TokenBoundCidrs** | Pointer to **[]string** | Comma separated string or JSON list of CIDR blocks. If set, specifies the blocks of IP addresses which are allowed to use the generated token. | [optional]
**TokenExplicitMaxTtl** | Pointer to **string** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional]
**TokenMaxTtl** | Pointer to **string** | The maximum lifetime of the generated token | [optional]
**TokenExplicitMaxTtl** | Pointer to **int64** | If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed. | [optional]
**TokenMaxTtl** | Pointer to **int64** | The maximum lifetime of the generated token | [optional]
**TokenNoDefaultPolicy** | Pointer to **bool** | If true, the 'default' policy will not automatically be added to generated tokens | [optional]
**TokenNumUses** | Pointer to **int32** | The maximum number of times a token may be used, a value of zero means unlimited | [optional]
**TokenPeriod** | Pointer to **string** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional]
**TokenPeriod** | Pointer to **int64** | If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. | [optional]
**TokenPolicies** | Pointer to **[]string** | Comma-separated list of policies | [optional]
**TokenTtl** | Pointer to **string** | The initial ttl of the token to generate | [optional]
**TokenTtl** | Pointer to **int64** | The initial ttl of the token to generate | [optional]
**TokenType** | Pointer to **string** | The type of token to generate, service or batch | [optional] [default to "default-service"]


Expand Down
2 changes: 1 addition & 1 deletion docs/AppRoleReadSecretIdTtlResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional]
**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration. | [optional]



Expand Down
2 changes: 1 addition & 1 deletion docs/AppRoleReadTokenMaxTtlResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**TokenMaxTtl** | Pointer to **string** | The maximum lifetime of the generated token | [optional]
**TokenMaxTtl** | Pointer to **int64** | The maximum lifetime of the generated token | [optional]



Expand Down
2 changes: 1 addition & 1 deletion docs/AppRoleReadTokenTtlResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**TokenTtl** | Pointer to **string** | The initial ttl of the token to generate | [optional]
**TokenTtl** | Pointer to **int64** | The initial ttl of the token to generate | [optional]



Expand Down
2 changes: 1 addition & 1 deletion docs/AppRoleWriteCustomSecretIdResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Name | Type | Description | Notes
**SecretId** | Pointer to **string** | Secret ID attached to the role. | [optional]
**SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional]
**SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional]
**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional]
**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional]



Expand Down
2 changes: 1 addition & 1 deletion docs/AppRoleWriteSecretIdResponse.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Name | Type | Description | Notes
**SecretId** | Pointer to **string** | Secret ID attached to the role. | [optional]
**SecretIdAccessor** | Pointer to **string** | Accessor of the secret ID | [optional]
**SecretIdNumUses** | Pointer to **int32** | Number of times a secret ID can access the role, after which the secret ID will expire. | [optional]
**SecretIdTtl** | Pointer to **string** | Duration in seconds after which the issued secret ID expires. | [optional]
**SecretIdTtl** | Pointer to **int64** | Duration in seconds after which the issued secret ID expires. | [optional]



Expand Down
62 changes: 31 additions & 31 deletions openapi.json
Original file line number Diff line number Diff line change
Expand Up @@ -30968,9 +30968,9 @@
"description": "Number of times a secret ID can access the role, after which the secret ID will expire."
},
"secret_id_ttl": {
"type": "string",
"type": "integer",
"description": "Duration in seconds after which the issued secret ID expires.",
"format": "duration"
"format": "int64"
},
"token_bound_cidrs": {
"type": "array",
Expand Down Expand Up @@ -31025,9 +31025,9 @@
"description": "Number of times a secret ID can access the role, after which the secret ID will expire."
},
"secret_id_ttl": {
"type": "string",
"type": "integer",
"description": "Duration in seconds after which the issued secret ID expires.",
"format": "duration"
"format": "int64"
},
"token_bound_cidrs": {
"type": "array",
Expand Down Expand Up @@ -31073,15 +31073,15 @@
"type": "object",
"properties": {
"period": {
"type": "string",
"type": "integer",
"description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.",
"format": "duration",
"format": "int64",
"deprecated": true
},
"token_period": {
"type": "string",
"description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds, or a string duration (e.g. \"24h\").",
"format": "duration"
"type": "integer",
"description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value. This takes an integer number of seconds.",
"format": "int64"
}
}
},
Expand Down Expand Up @@ -31126,9 +31126,9 @@
"description": "If true, the secret identifiers generated using this role will be cluster local. This can only be set during role creation and once set, it can't be reset later"
},
"period": {
"type": "string",
"type": "integer",
"description": "Use \"token_period\" instead. If this and \"token_period\" are both specified, only \"token_period\" will be used.",
"format": "duration",
"format": "int64",
"deprecated": true
},
"policies": {
Expand All @@ -31151,9 +31151,9 @@
"description": "Number of times a secret ID can access the role, after which the secret ID will expire."
},
"secret_id_ttl": {
"type": "string",
"type": "integer",
"description": "Duration in seconds after which the issued secret ID expires.",
"format": "duration"
"format": "int64"
},
"token_bound_cidrs": {
"type": "array",
Expand All @@ -31163,14 +31163,14 @@
}
},
"token_explicit_max_ttl": {
"type": "string",
"type": "integer",
"description": "If set, tokens created via this role carry an explicit maximum TTL. During renewal, the current maximum TTL values of the role and the mount are not checked for changes, and any updates to these values will have no effect on the token being renewed.",
"format": "duration"
"format": "int64"
},
"token_max_ttl": {
"type": "string",
"type": "integer",
"description": "The maximum lifetime of the generated token",
"format": "duration"
"format": "int64"
},
"token_no_default_policy": {
"type": "boolean",
Expand All @@ -31181,9 +31181,9 @@
"description": "The maximum number of times a token may be used, a value of zero means unlimited"
},
"token_period": {
"type": "string",
"type": "integer",
"description": "If set, tokens created via this role will have no max lifetime; instead, their renewal period will be fixed to this value.",
"format": "duration"
"format": "int64"
},
"token_policies": {
"type": "array",
Expand All @@ -31193,9 +31193,9 @@
}
},
"token_ttl": {
"type": "string",
"type": "integer",
"description": "The initial ttl of the token to generate",
"format": "duration"
"format": "int64"
},
"token_type": {
"type": "string",
Expand Down Expand Up @@ -31229,9 +31229,9 @@
"type": "object",
"properties": {
"secret_id_ttl": {
"type": "string",
"type": "integer",
"description": "Duration in seconds after which the issued secret ID should expire. Defaults to 0, meaning no expiration.",
"format": "duration"
"format": "int64"
}
}
},
Expand All @@ -31251,9 +31251,9 @@
"type": "object",
"properties": {
"token_max_ttl": {
"type": "string",
"type": "integer",
"description": "The maximum lifetime of the generated token",
"format": "duration"
"format": "int64"
}
}
},
Expand All @@ -31270,9 +31270,9 @@
"type": "object",
"properties": {
"token_ttl": {
"type": "string",
"type": "integer",
"description": "The initial ttl of the token to generate",
"format": "duration"
"format": "int64"
}
}
},
Expand Down Expand Up @@ -31350,9 +31350,9 @@
"description": "Number of times a secret ID can access the role, after which the secret ID will expire."
},
"secret_id_ttl": {
"type": "string",
"type": "integer",
"description": "Duration in seconds after which the issued secret ID expires.",
"format": "duration"
"format": "int64"
}
}
},
Expand Down Expand Up @@ -31611,9 +31611,9 @@
"description": "Number of times a secret ID can access the role, after which the secret ID will expire."
},
"secret_id_ttl": {
"type": "string",
"type": "integer",
"description": "Duration in seconds after which the issued secret ID expires.",
"format": "duration"
"format": "int64"
}
}
},
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion schema/model_app_role_look_up_secret_id_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

6 changes: 3 additions & 3 deletions schema/model_app_role_read_period_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

12 changes: 6 additions & 6 deletions schema/model_app_role_read_role_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion schema/model_app_role_read_secret_id_ttl_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion schema/model_app_role_read_token_max_ttl_response.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit cd7bc62

Please sign in to comment.